1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
11

Write the feature of mark-I​

Computers and Technology
1 answer:
Marysya12 [62]3 years ago
5 0

Explanation:

mark 1 was massive in size measuring 8 feet high, 51 feet long and 3 feet deep

You might be interested in
Identify the components of the enveloped virus budding process
Elina [12.6K]

The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

<h3>What is the case of the virus about?</h3>

Virus budding in general is known to be a term that connote the scattering or disturbance of a cellular membrane and it is one away from the cytoplasm.

Note that it is said to be the envelopment of the viral capsid and this is done by one or more lipid bilayers that can be seen in the viral membrane glycoproteins, and it is one where a fission event takes place.

Hence The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

Learn more about virus from

brainly.com/question/26128220

#SPJ1

3 0
2 years ago
Generally, what is the term for storage locations in a processor?
oksano4ka [1.4K]

Answer: Registers

Explanation:

Registers are small storage locations identified by different types of registers. The function of the register is to provide data for immediate processing to the CPU. These registers hold data temporarily and provide easy access of data to the processor.

6 0
3 years ago
Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of eva
larisa [96]

Answer:

<em>The programming language is not stated;</em>

<em>However, the program written in Python is as follows</em>

def solveEquation(x,y,z):

     result = z - y + 2 * x

     print(result)

x = float(input("x = "))

y = float(input("y = "))

z = float(input("z = "))

print(solveEquation(x,y,z))

Explanation:

This line defines the function solveEquation

def solveEquation(x,y,z):

This line calculates the expression in the question

     result = z - y + 2 * x

This line returns the result of the above expression

     print(result)

The next three lines prompts user for x, y and z

x = float(input("x = "))

y = float(input("y = "))

z = float(input("z = "))

This line prints the result of the expression

print(solveEquation(x,y,z))

3 0
3 years ago
Why does my Office Computer send packet #1? What device responds by sending back packet #2? What information does my Office Comp
AleksandrR [38]

Answer:

The office computer is part of a network.

The server responds with a packet when a request packet is sent by a client.

The computer confirms the IP address and port number to retrieve the encapsulated data, for a specific application in the system.

Explanation:

The computer network is the communication of two or more devices. There are two forms of network, there are peer to peer and client/server networks.

The peer to peer network allows for each computer to send and receive data, while the client/server network have a dedicated server to send resources to clients that request for it. Data transferred are encapsulated in the network, transport and data-link layer PDU headers and would be decided in the destination system to retrieve the data.

4 0
3 years ago
Which type of boot authentication is more secure?
Vinvika [58]

Answer:

UEFI

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the type of account and normal balance of allowance for uncollectible accounts?
    13·2 answers
  • What limits the impact of vehicle balance on view ghost ability during emergency vehicle maneuvers?
    15·1 answer
  • (PLS HELP 99 POINTS) In a paragraph of no less than 125 words, explain the three aspects involved in gaining a true appreciation
    14·2 answers
  • What is the name for the percentage of people who don't have jobs in a country or area?
    11·2 answers
  • Which of the following is 1000 of a second​
    15·1 answer
  • For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc
    5·1 answer
  • What are the correct steps to find the system specifications such as the amount of RAM or system type?
    13·1 answer
  • What is the hack of the cookie clicker
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly. Kenny is designing a document for the employee motivation campaig
    8·1 answer
  • In addition to letting people share files, what is the most useful feature of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!