1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Usimov [2.4K]
3 years ago
15

WAP to enter 4 no and find the greatest among them.​

Computers and Technology
1 answer:
Marrrta [24]3 years ago
4 0
This is most definitely a WAP !!!
You might be interested in
The fall of the Berlin Wall and the emergence of a way to find things on the Web through the Netscape browser were two that was
Romashka-Z-Leto [24]
<h2>Answer:</h2>

Option 4. a way for software to communicate and become interactive

is the correct answer.

<h2>Explanation:</h2>

<h2>The fall of the Berlin Wall and the emergence of a way to find things on the Web through the Netscape browser were two that was browser were two events that flattened the world. A third platform was needed to change the world and that was a way for software to communicate and become interactive.</h2><h2 />

This question belongs to the advent of software and technology that has made world a global village. The factors that played important roles are Fall of Berlin wall and Netscape browser.

The third thing the added to connectivity among people is the production of softwares like Skype and other social applications that made it easier for people to interact with other and communicate faster.

<h2>i hope it will help you!</h2>
5 0
3 years ago
In a virtual memory system, each process must have its own page table.(True or False?)
Anna71 [15]

Answer: True

Explanation:

 Virtual memory is the secondary storage memory and this type of memory are addressed as main part of the memory.

When the virtual memory copying in the physical memory then, at that time the operating system divide the memory into the file page with the address and definite size number. Then, the each page are store in a disk.

When this page are required then, the operating system copy from disk to main memory and then, the virtual address are converted into the  real address.

6 0
3 years ago
What is the storage of a modern hard disk drive?
Alinara [238K]

Answer:

80 gigs of storage

Explanation:

it gives a bunch of room because of the calculations the vomputer

3 0
3 years ago
What is the decimal form of the following binary ip address? 11001101.00111001.10101001.01000010
jasenka [17]

The decimal form of the 11001101.00111001.10101001.01000010 binary ip address is 205.57.169.66.

An IP address is a binary number with 32 bits. The 32 bits are divided into four octets, which are groupings of 8 bits each. An IP address, however, is shown as a dotted decimal number (for example: 205.57. 32.9).

Memory regions are given binary addresses by the computer system. But in order to access a memory location, the system utilises a certain number of bits. We can address two memory regions with 1 bit. We can address 4 memory locations with 2 bits and 8 memory locations with 3 bits.

The 4 sets of 8 bits in each of the 4 directions are simply written down to create the 32-bit binary IP address.

Learn more about binary ip address:

brainly.com/question/14541891

#SPJ4

3 0
2 years ago
Produce an infinite collection of sets A1,A2,A3, . . . with the property that every Ai has an infinite number of elements, Ai ∩
atroni [7]

Answer:

Produce an infinite collection of sets A1,A2,A3, . . . with the property that every Ai has an infinite number of elements, Ai ∩ Aj = ∅ for all i = j, and [infinity] i=1 Ai = N.

Explanation:

Solution

For n ∈ N,

define  A_n = {2 ^n−1  ,(3)(2n−1 ),(5)(2^n−1 ),(7)(2^n−1 ), . . .}

I.e. A_n is all odd multiples of 2^n−1 . We must show that these sets satisfy the desired properties.

• (Infinite Number of Elements).

It is clear that the set A_n = {2 ^n−1 ,(3)(2^n−1 )(5)(2^n−1 ),(7)(2^n−1 ), . . .}  has infinitely many elements.

• (Disjoint).

Given A_n and A_m with n ≠ m, we can assume, without loss of generality, that n < m. Suppose  that there existed some x ∈ A_n ∩ A_m. Then by definition of these sets, there exists some odd numbers k  and l such that x = 2^n−1 . k = 2^m−1  . l.

However since n < m, we have that n ≤ m − 1, and therefore we  can write 2^m−1 = (2^n )(2 i ) with i ≥ 0. Hence we have 2^n−1 . k = 2^n. 2 ^i. l  

Dividing both sides by 2^n−1 yields  k = (2)(2^i ) .l, which contradicts the assumption that k is odd. Therefore A_n ∩ A_m = ∅.

• (Union is N).

We want to show that  [infinity] i=1 A_n = N.

(⊆). Since each A_n is a subset of N, the union of these sets is a subset of N as well.

(⊇).Given any x ∈ N, we can write x = 2^n−1 . k for some n ∈ N where k is odd. Then x ∈ A_n, as  desired.

5 0
3 years ago
Other questions:
  • _____ provide the standards, syntax, statements, and instructions for writing computer software
    14·1 answer
  • Convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
    12·1 answer
  • The Earth's _______ is ductile overall, tending to flow very slowly and deform in a _______ manner.
    14·2 answers
  • What is a Photojournalist
    5·1 answer
  • Using C#, declare two variables of type string and assign them a value "The "use" of quotations causes difficulties." (without t
    11·1 answer
  • What will empty the log of Internet sites you have recently viewed
    12·2 answers
  • Can someone tell me how to fix the keyboard on ipad?- its in the middle of my screen andd i dont know how to do it
    13·1 answer
  • When machining rotors, what is the reason for setting the indexing collars to zero?
    9·1 answer
  • A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate
    7·1 answer
  • In Python which is the correct method to load a module math?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!