1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
quester [9]
3 years ago
13

States that processor speeds, or overall processing power for computers, will double every 2 years.

Computers and Technology
1 answer:
stepladder [879]3 years ago
4 0

Answer: moore's law

Explanation:

You might be interested in
Dell, previously the world’s number one PC manufacturer, has seen its market share shrink because of rivals copying its value ch
stepladder [879]

Answer:

A) underscore the importance of continually assessing a firm's strategic position among changing market conditions.

Explanation:

Dell computers believed their leadership position would last forever and forgot the basic rule that it is very hard to reach the top, but it's even harder to stay there.

The market conditions changed since globalization made the world smaller, increasing the potential customers but also increasing competition. Dell wasn't able to revise their strategic position and adapt it to changing markets. A company's strategic position refers to how its strategy deals with changing:

  • environments,
  • competition,
  • resources,
  • stakeholders' expectations.

The same thing happened to General Motors, that once used to be the largest and most profitable car manufacturer in the world, and then went bankrupt. It is still under a lot of financial stress and is continuously losing market share in the US and around the world.

5 0
4 years ago
Default tab stops are set in word every _______ inch. a. ¾ b. ½ c. 1 d. ¼
Dennis_Churaev [7]
A) 3/4 inch Meow! XD
6 0
3 years ago
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
David bought 5.2 pounds of oranges for $1.20 per pound . how much did david spend ..............................................
Tcecarenko [31]

Answer:

David spent $6.24.

Explanation:

5.2 times 1.2

3 0
3 years ago
Someone to explain one by one of the 7 C's in communication skills​
antiseptic1488 [7]

Answer:

clear)

be clear about the purpose of the message you’re delivering.

concise)

When communicating messages of this nature it’s important to stick to the point and keep your messages short and simple.

concrete)

When shaping your communication you must ensure that you are specific and that the logic and messages that you’re using fit together, build on each other and support each other.

correct)

It’s essential that both the factual information and the language and grammar you use are correct.

coherent)

If your communications are not coherent they will not be effective.

complete )

When creating a message, it’s important to give the recipient all of the information they need to follow your line of reasoning and to reach the same conclusions you have.

courteous)

You can increase the effectiveness of your communications by being polite and showing your audience that you respect them.

Explanation:

6 0
3 years ago
Other questions:
  • Once you've connected to a data source, which button would you select to add a first name to your form letter?
    6·2 answers
  • Witch word in the sentence is a noun? the food he is cooking smells delicious.
    7·1 answer
  • When paying bills online, a payee is:
    9·1 answer
  • What does hdr stand for?
    6·2 answers
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • What will be the result of running the following code fragment? int year = 0; double rate = 5; double principal = 10000; double
    14·1 answer
  • Why is a partial mesh topology more common than a full mesh topology?
    5·2 answers
  • Explica porque se afirma que la existencia de estaciones cambia las combstumbres y la cultura​
    14·1 answer
  • 2. Why do old video games have large pixels and images with jagged edges?
    6·1 answer
  • Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!