1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
2 years ago
6

A town government is desinging anew bus system

Computers and Technology
1 answer:
Kamila [148]2 years ago
3 0

Answer:

Umm what? Are you talking about the type of problem it is? If so it is an optimization problem.

Explanation:

I had something like this for one of my tests and I chose the optimization problem because it finds the values of decision variables that result in a maximum or minimum of a function.

But ion know if it's this that you are talking about

You might be interested in
Raid level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows
Leviafan [203]

Answer:

True

Explanation:

3 0
3 years ago
Each pixel includes 3 colors; Red, Green and Blue. Each color uses 8 bits to store it's intensity. How many Bytes are needed for
PtichkaEL [24]

Answer: 3 bytes

Explanation:

A Pixel uses 3 colors and each of these colors uses 8 bits to store their intensity.

One pixel will therefore have:

= 8 * 3

= 24 bits

1 byte = 8 bits

24 bits will therefore be:

= 24/8

= 3 bytes

6 0
3 years ago
What is the output <br>this is a computer science question ​
olga2289 [7]

Answer:

output is a last step of IPO cycle in which we can get meaningful information through output devices

6 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Why is the cpu the most important component in a computer?
german
CPU (Central Processing Unit) is also known as the brain of the computer because this is the place which actually runs the programs. The programs are the set of instructions needed to perform a task.
4 0
2 years ago
Other questions:
  • A computer which links several pcs together in a network is called
    10·1 answer
  • What does xhtml stand for?
    5·2 answers
  • What is daemontools pakage in qmail?
    14·1 answer
  • You are out on the water. you do not understand what another boater intends to do. what sound signal should you make?
    14·1 answer
  • This is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits. a. Scrip
    14·1 answer
  • The hardware to keep the output data when finished is a
    9·1 answer
  • Which of the following is the best example of an installation issue?
    6·2 answers
  • The use of Quick Styles is a great way to save
    15·1 answer
  • How do you answer a question that's already been answered?
    5·1 answer
  • In PowerPoint, a picture might be a photograph, a shape you draw, a piece of clip art, or an illustration created using a graphi
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!