1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
6

Select the correct answer.

Computers and Technology
1 answer:
Galina-37 [17]3 years ago
8 0
Functional languages
You might be interested in
1. Your boss wants you to sign your timesheet electronically. Which of the following is not a possible way to represent an elect
photoshop1234 [79]
1b2c3a4d5a6c7d8b9a10a
6 0
4 years ago
IRQ 0 interrupt have _______________ priority<br> ? low<br> ? medium<br> ? highest<br> ? lowest
tekilochka [14]

Answer:

Highest

Explanation:

A interrupt request / IRQ is in which instructions are sent to Cpu and uses an interrupt handler to run distinct program . Hardware interrupts are used to manage occurrences such as obtaining modem or network card information, important presses, or mouse motions.

  • Interrupt request 0. – it is a system timer (can not be altered)
  • Interrupt request 1 – keyboard controller (can not be changed)
  • Interrupt request 2 – cascaded IRQ 8–15 signals (any device configured to use IRQ 2 will genuinely use IRQ 9)
  • Interrupt request 3 – serial port 2 controller
  • Interrupt request 4 –  serial port 1 controller
  • Interrupt request 5 –parallel port 2 and 3
  •  Interrupt request 6 - floppy disk controller
  •  Interrupt request 7 –parallel port 1. If a printer is not present, it is used for printers or for any parallel port. It can also possibly be shared with a secondary sound card with cautious port management.

As interrupt number increases priority level decreases, Priority level 0 is the highest priority level .

4 0
3 years ago
What is computer generation.<br>name that generations ​
Brut [27]
Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Generation & Description
1 First Generation
The period of first generation: 1946-1959. Vacuum tube based.

2 Second Generation
The period of second generation: 1959-1965. Transistor based.

3 Third Generation
The period of third generation: 1965-1971. Integrated Circuit based.

4 Fourth Generation
The period of fourth generation: 1971-1980. VLSI microprocessor based.

5 Fifth Generation
The period of fifth generation: 1980-onwards. ULSI microprocessor based.
7 0
3 years ago
Read 2 more answers
What is the body of scientific knowledge based on?
ANTONII [103]
It depend on all such as guess ,observation ,hypothesis and etc
3 0
3 years ago
Read 2 more answers
In light of common budget constraints, explain how security professionals can participate in the training necessary to maintain
Anika [276]

Answer:

Security of the computer systems is becoming more crucial as the days go by due to events that threatens the safety and security of these computers, the internet and the resources shared on them.Security professionals are those people who have the necessary skill set to handle the security situation of the computers and network and can both maintains these systems and resolve  any security issue.

In light of the skill sets that they posses, they work for firms or they work on their own to maintain security. In general every skill needs to be revised and these skill is not an exception also there are newer threats and security issues which are arising every day hence there is need to maintain competence in their field which requires undergoing training and practice to handle the latest security threats that is constantly evolving each day.Due to the issue of budget constrains the security professionals can take the following actions in order to be able to participate in training:

  • Involve themselves in taking online courses over the internet
  • They can acquire self education materials , researches and case studies on both recent and past security events
  • They also engage in peer guidance and mentoring which would work in a vise versa way for information and knowledge exchange
  • participating in "hackathons" and  competitions as a way for them to identify the features and skill set to improve  

Explanation:

The question requires explanation so instead of answering the question by stating the points we first give a brief description of the state of  digital security in the world.Next we now talk about the security professionals ( who they are and what they do). Finally we then discuss about the need for training for these professionals and how these security professionals can access these training in a situation where there is a budget constrain issue  

8 0
3 years ago
Other questions:
  • What type of code was Pinterest Pin button created in?
    10·1 answer
  • Which of the following functions and expressions will convert the ASCII character "Z" to its numeric equivalent ASCII code?
    7·1 answer
  • Unlike clip art, you cannot resize a photograph using the mouse. <br> a. True<br> b. False
    13·1 answer
  • Under what circumstances would it be appropriate to use the sentence method of note taking, and what are the advantages and disa
    7·2 answers
  • This provides an easy method for workers to use their computers.
    10·2 answers
  • Tips for Interactions with Personalized LinkedIn Outreach?
    5·1 answer
  • "If possible, always bring print-outs of your slides for your audience
    7·2 answers
  • Technically a coding question utilizing python how would one calculate a square root
    8·1 answer
  • Your sister has just emailed you an attached file with the invitation list for her upcoming party.
    11·2 answers
  • Need help with Python coding...
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!