1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
4 years ago
14

Integrated circuits are made up of _____ and carry an electrical current

Computers and Technology
1 answer:
Rasek [7]4 years ago
4 0

Answer:

integrated circuits are made up of Transistor and carry an electrical current

You might be interested in
1) State one change you could make to a CPU to make a computer work faster.
Darina [25.2K]

Answer:

<h2><em><u>Mark</u></em><em><u> me</u></em><em><u> as</u></em><em><u> a</u></em><em><u> Brainliest</u></em><em><u> pls</u></em></h2>

Explanation:

1)

  • removing cache and tmp files
  • Changing the processor
  • Upgrading the ram
  • Removing the maximum Graphics of the computer
  • could make to a CPU to make a computer work faster.

2)

  • Input source
  • output source

I hope this answer is helpful to you

8 0
3 years ago
a) (20 points) Define the method inDogish recursively such that it returns true if the word is in dog-ish and false if it is not
tia_tia [17]

Answer:

/ Main.java

class Main {

     public static void main(String[] args) {

           //System.out.println(inDogish("aplderogad"));

           //System.out.println(inXish("aplderogad", "dog"));

     }

     // returns true if the word is in dog-ish

     // returns false if word is not in dog-ish

     public static boolean inDogish(String word) {

           /**

           * Note: we can use the inXish() method to complete this method in a

           * single line if you want. just write 'return inXish(word,"dog");' and

           * you are done.

           */

           // if word is null or empty, returning false

           if (word == null || word.length() == 0) {

                 return false;

           }

           // converting word to lower case

           word = word.toLowerCase();

           // if 'd' does not exist on the word, returning false

           if (!dogishHelper(word, 'd')) {

                 return false;

           }

           // removing the characters upto first 'd' in word

           word = word.substring(word.indexOf('d') + 1);

           // if 'o' does not exist on the word, returning false

           if (!dogishHelper(word, 'o')) {

                 return false;

           }

           // removing the characters upto first 'o' in word

           word = word.substring(word.indexOf('o') + 1);

           // if 'g' does not exist on the word, returning false, otherwise

           // returning true

           if (!dogishHelper(word, 'g')) {

                 return false;

           } else {

                 return true;

           }

     }

     // necessary to implement inDogish recursively.

     // returns true if letter is in word, else not.

     public static boolean dogishHelper(String word, char letter) {

           // if word is empty, returning -1

           if (word == null || word.length() == 0) {

                 return false;

           }

           // if first character in word is letter, returning 0

           if (word.charAt(0) == letter) {

                 return true;

           }

           return dogishHelper(word.substring(1), letter);

     }

     // the best thing about the above helper method is that we can use it in

     // inXish method also

     // a generalized version of the inDogish method

     public static boolean inXish(String word, String x) {

           // if x is empty, returning true (base case, which means all the letters

           // in x are in word in that order)

           if (x.length() == 0) {

                 return true;

           }

           // getting first character of x

           char first = x.charAt(0);

           // if first character does not exist on the word, returning false

           if (!dogishHelper(word, first)) {

                 return false;

           }

           // calling and returning inXish recursively, passing the word after

           // removing characters upto first occurrance of char first, and x after

           // removing first character from it

           return inXish(word.substring(word.indexOf(first) + 1), x.substring(1));

     }

}

Explanation:

7 0
4 years ago
Consider two decision problems X and Y. If X reduces in polynomial time to 3-SAT and 3-SAT reduces in polynomial time to Y. Whic
tekilochka [14]

Answer:

X is in NP and Y is in NP-HARD ( A )

Explanation:

X is in NP and Y is in NP-HARD can be inferred from the previous statement made in the problem above because  problem decision X  can be in NP if it can BE reducible to a 3-SAT polynomial real time, if that can be achieved then  3SAT will be in NP since SAT is in NP as well.

also problem decision Y  can be in NP-HARD if 3SAT can be reducible to it in polynomial time as well hence option A is the correct option

8 0
3 years ago
Which Cisco network security tool is a cloud-based service that provides alerts to network professionals about current network a
ArbitrLikvidat [17]

Answer:

Security Intelligence Operations      

Explanation:

Security Intelligence Operations    

  • It is an advanced security framework that offers the detection, assessment and prevention of risks and continuously provides clients with the maximum level of security.
  • It provides quick and efficient security to allow consumers to interact and work together and adopt new technology in a secure manner.
  • It does effective identification of malware, proactive security against loss of data and embraces new technologies to stay ahead of the new threats.
  • The three main components of Cisco Security Intelligence Operations are Cisco SensorBase, Threat Operations Center, and Dynamic updates.
  • Cisco SensorBase is the biggest vulnerability detection database that collects traffic and sensor data from an extensive network of Cisco devices and services worldwide.
  • Threat Operations Center consists of a virtual team of researchers, technicians, security analysts, engineers that collect data from SensorBase and provide actionable intelligence and realistic information to provide security against current and complex threats.
  • Dynamic updates provide real time alerts distributed automatically to monitoring devices, as well as best guidelines and other resources focused on helping customers to monitor attacks, interpret information, and eventually improve the overall security procedures of their organization.
4 0
3 years ago
Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and
BabaBlast [244]

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

5 0
3 years ago
Other questions:
  • When used as parameters, _________ variables allow a function to access the parameter’s
    10·1 answer
  • Need answer quick
    9·1 answer
  • A derived character that is shared by all members of a clade is called a ______________ of that clade.
    6·1 answer
  • 2. Driving above the posted speed limit is _
    13·2 answers
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    9·2 answers
  • Question 1 (1 point)
    5·2 answers
  • How to enhance the video to full screen in filmora
    15·1 answer
  • Why would a programmer use the logical operator or in an if statement? (5 points)
    14·1 answer
  • What happens in the development phase of the software development life cycle?
    10·1 answer
  • A)​What would be the state of the following list after each of the first four passes in a Bubble sort, sorting into ascending se
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!