1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vladimir1956 [14]
3 years ago
8

As computer words get larger and larger, there is a law of diminishing returns: the speed of execution of real application progr

ams does not increase and may, in fact, decrease. Why do you suppose that this is so?
Computers and Technology
1 answer:
otez555 [7]3 years ago
3 0

Answer:

Explanation:

I can pick a reason out of many, and that would be the software. The fact is that, even as they are computers and machines, the softwares themselves have particular design cap. A software that was designed for systems with a narrow word size will most likely have issues as more and more words are used on it. I don't know if you understand what I'm saying, everything has a cap, once that particular meter is approaching, systems tend to slow onwards.

When it comes to the hardware part using the same technology, it might take a longer time to do basic arithmetic on larger inputs.

When you're under using a system, it tends to have a lot of space, excess, to perform its functions, but as soon as it is nearing its limit, it will slow down so as to accommodate all the processes at once.

You might be interested in
How to make an upside down exclamation point on mac?
denis-greek [22]
Option + 1

-----------------------------
5 0
3 years ago
A compressed audio file format developed by the Moving Picture Experts Group is called
8_murik_8 [283]

Answer:

The appropriate response is "MP3 file".

Explanation:

  • MPEG seems to be an association of ISO as well as IEC international organizations that make recommendations for media encryption, comprising processing of sound, illustrations and functional genomics, and file configurations for numerous technologies.
  • MP3 seems to be a sound file stored in something like a compression digital audio created through MPEG consisting utilizes "Layer three" audio processing.
5 0
3 years ago
Exampels of semantic tags ?​
spayn [35]
A semantic element clearly describes its meaning to both the browser and the developer.Examples of non-semantic elements: and <span> - Tells nothing about its content. Examples of semantic elements: ,, and - Clearly defines its content.</span>
4 0
3 years ago
Intranets:
SOVA2 [1]

Answer:

A, C, D and E

Explanation:

An intranet is synonymous to a private LAN or WAN network but in contrast to the extranet or internet. Resources are retrieved and/ or shared within devices in the private network. It uses the internet protocol suite model of networking for communication, but also uses private IP addresses, which are not routable on the internet.

The communication between devices can be a peer to peer connection or client-server connection, using the mainframe computer technologies as the dedicated servers of the network.

7 0
4 years ago
The Scratch blocks are organized into 9 color-coded categories. Select all that apply.
Ira Lisetskai [31]
Motion,control,operators,events,sound,loop,looks, more blocks, and I think sensing!
7 0
3 years ago
Other questions:
  • What is a BINARY, bits and bytes ​
    5·1 answer
  • ​Which of the following styles sets the column breaks within paragraphs to leave a minimum of two and three lines at the top and
    11·1 answer
  • Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0
    6·1 answer
  • In c++ when you create a class and you don't want to put the class and the main program in one source file and let's say you cre
    14·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    12·1 answer
  • The 7-bit ASCII code for the character ‘&amp;’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    12·1 answer
  • A(n) ________________ must be completed immediately following an incident as it is an essential document that details an inciden
    14·1 answer
  • Difference between server and a client computer
    7·1 answer
  • Karen wants to create a program that will allow the user to input their age. Which of these lines of code should be used?
    11·1 answer
  • Write a program that ask a user to input radius of a circle and display circumference of a circle
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!