1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
6

What is 38 - -93 + 2 x 4.6? and what’s 9,220 - -2.3 x U

Computers and Technology
1 answer:
Degger [83]3 years ago
7 0

Answer:

the first equation is 140.2

what's the last eqaution U???

Explanation:

You might be interested in
LISTEN I NEED EVERY SINGLE BRAINLY USER TO RE POST THIS THERE IS A USER WHO JUST SAID THEY ARE GOING TO KILL THEMSELVES PLEASE C
Over [174]
WHAT IS THE NAME OF THE BRAINLY USER
7 0
3 years ago
Read 2 more answers
Given the following word addresses: 3, 180, 43, 2,191, 88, 190, 14, 181, 44, 186, 253
professor190 [17]

Answer:

A. index bits = 2, tag bits = 2, block offset bits = 1, it is a miss.

B. index bits = 2, tag bits = 1, block offset bits = 0, it is a hit

C. the miss rate is 0

Explanation:

a. number of blocks = 12

number of blocks per set = 3

number of set = number of blocks / number of blocks per set = 12/3 = 4

word size = 24

block size = 2

the block offset = log_{2} block size

   = log_{2} 2 = 1

the index bits = log_{2} number of set = log_{2} 4 = 2

the tag bits = (log_{2} word size) - offset - index = (log_{2} 24) -2 - 1 = 5 -2 - 1 = 2

b. word size = 8

block size = 1

the block offset = log_{2} block size

   = log_{2} 1 = 0

the index bits = log_{2} number of set = log_{2} 4 = 2

the tag bits = (log_{2} word size) - offset - index = (log_{2} 8) -2 - 1 = 3 - 0- 2= 1

7 0
3 years ago
James added a new video card and needs to get a power supply that will have enough power to run the new card. When researching t
Shtirlitz [24]

Answer:

the voltage it will need to give and take

Explanation:

it all depends on the amount of voltage the video card requires say the video card requires 150v you would have to buy a power supply that would be able to support that and all the other parts so you would buy a 550v power supply

3 0
3 years ago
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
What is the term that refers to an Internet marketing technique in which you pay for high search engine results by advertising o
kakasveta [241]
Im afraid if i give u an answer u’ll get confused
4 0
3 years ago
Other questions:
  • Which of the following is where you can save, select a template, change document properties, and close or exit excel?
    8·1 answer
  • A computer system has 9,850 processes and 172 of them were suspended while 276 of them were terminated. Explain why some of the
    12·1 answer
  • Guys! Please help me! Please help me do this activity, and the best answer will be awarded with a surprise prize!
    14·1 answer
  • Anna's computer has slowed down. How might she improve her computer's performance? Select one of the options below as your answe
    10·1 answer
  • Write one similarity and one difference between '_' (underscore) ' % ' wildcard symbol .
    11·1 answer
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
  • Brian is a computer engineer who writes security software for a banking system. The
    13·1 answer
  • The first cell phones in widespread use were . Smartphone technological advancements added services. Answer the following questi
    12·2 answers
  • What are the cloud storage components
    6·1 answer
  • The correct banner marking for unclassified documents with cui is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!