1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
9

What is Mark Dean’s main contribution to the development of the computer?

Computers and Technology
1 answer:
lora16 [44]3 years ago
3 0

Answer: Computer scientist and engineer Mark Dean helped develop a number of landmark technologies for IBM, including the<em><u> color PC monitor</u></em> and the<u><em> first gigahertz chip</em></u>. He holds three of the company's original nine patents.

You might be interested in
We have constructed a Player Class for you. Add the following: public static variable: int totalPlayers Static variable should b
Margaret [11]

Answer:

public class Player {

   public static int totalPlayers = 0;

   public static int maxPlayers = 10;  

   public static boolean gameFull() {

       return totalPlayers >= maxPlayers;

   }

   public Player() {         // Player class constructor

       totalPlayers++;

   }

}

Explanation:

The Java program defines the class Player which has two public class variables and a public method. The class constructor increases the totalPlayer variable by one for every player object created.

5 0
3 years ago
You use webshot to create desktop slide shows for your personal screen saver. Your boss asks you to display your screen so that
FrozenT [24]
I believe _B_ but check the national copyright law.
8 0
3 years ago
Read 2 more answers
State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external
prisoha [69]

Compaction often gives solutions to the issues regarding external fragmentation.

One technique for overcoming external fragmentation in dynamic partitioning is

Compaction.

The reason why this technique of overcoming external fragmentation may be inefficient is because:

  • External fragmentation may need a lot of compaction and it is an expensive operation.

  • The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process.

  • Compaction only takes place when relocation is dynamic, and this also is expensive.

Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.

External fragmentation takes place when free memory is removed into small blocks.

Learn more from

brainly.com/question/23636593

4 0
2 years ago
The format for the UPDATE command is the word UPDATE, followed by the name of the table to be updated. The next portion of the c
fenix001 [56]

The format for the UPDATE command is the word UPDATE, followed by the name of the table to be updated. The next portion of the command consists of the word <u>SET</u>, followed by the name of the column to be updated, an equals sign, and the new value.​

Explanation:

  • An Update Query is an action query (SQL statement) that changes a set of records according to criteria you specify.
  • The SQL UPDATE Query is used to modify the existing records in a table. You can use the WHERE clause with the UPDATE query to update the selected rows, otherwise all the rows would be affected.
  • Update Queries let you modify the values of a field or fields in a table.

<u>UPDATE Syntax </u>

  • UPDATE table_name
  • SET column1 = value1, column2 = value2, ...
  • WHERE condition;

UPDATE table_name SET column1 = value1, column2 = value2, etc WHERE condition;  

  1. table_name: name of the table
  2. column1: name of first , second, third column....
  3. value1: new value for first, second, third column....
  4. condition: condition to select the rows for which the  
  5. values of columns needs to be updated.

8 0
4 years ago
A(n) ________ is software and/or hardware that monitors system and network resources and activities and notifies network securit
enyata [817]

Answer:

intrusion detection system

Explanation:

intrusion detection system

IDS or the intrusion detection system is the software and/or hardware system which can be used to monitor for detecting suspicious network activities and monitoring the system and notifying teams when there are attempts to break the secure network infrastructure.

5 0
4 years ago
Other questions:
  • Are there any tips or helpful advice for people who want to learn Photoshop?
    10·1 answer
  • I need help with this​
    7·1 answer
  • IOS jail broken or Android unrooted which is better to hack with
    6·1 answer
  • Which key is used to indent the first line of a paragraph to the right?
    15·2 answers
  • Given the following code, what are the dimensions, in pixels, of the shape created? import tkinter class myShape: def __init__(s
    6·1 answer
  • Fill in the code to complete the following method for checking whether a string is a palindrome. public static boolean isPalindr
    11·1 answer
  • By the definition of a computer, justify if a mobile phone and a calculator are computers or not​
    13·1 answer
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    5·1 answer
  • In python
    9·1 answer
  • A research study does not need to be well designed to be effective.<br> False<br> O True
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!