1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
3 years ago
7

Question 1

Computers and Technology
1 answer:
Alexxandr [17]3 years ago
7 0

Explanation:

so, what do you think ?

I am sure you have used a computer or a smart phone yourself.

how many clicks or taps do you want to do before you you get what you were looking for ?

hmmmm ?

as few a possible, right ?

ideally, of course, this is one (1) click or tap.

You might be interested in
Since the actions in a textual storyboard are often very close to actual program code, the statements in a textual storyboard ar
Kaylis [27]

Answer: Pseudo code

Explanation:Pseudo code is a false code that is written in the textual story board to make the fictional plot of the story more understandable in the layman terms for everyone.This is done to increase the readability of the code , which cannot be understood easily by the actual code.

It is implemented on the algorithms of a program in computer field so that the complex coding statements can be understood by the programmer.

7 0
3 years ago
Andy wants to install a new Internet connection. He wants to take the fastest he can get. What are the maximum speeds for the fo
aksik [14]

Answer:

1. so if i wanted to build a linux server for web services(apache) with 1cpu and 2 gb of memory.-operating at 75% of memory capacity2. a windows server with 2 cpu/ 4gb memory- operating at 85% of memory capacity3. a storage server with 1 cpu/ 2gb memory- operating at 85% of memory capacityhow much memory do i have to add for each server. so that the utilization rate for both cpu and memory is at a baseline of 60%."the details for the cpu like its processor or the memory's speed isnt to be concerned" yeah i kept asking my teacher if he's even sure about the but the whole class seems to be confused and the project is due in 3 days..this is a virtualization project where i have to virtualize a typical server into an exsi hypervisor.

5 0
3 years ago
In Broadbent's filter model of attention, the stages of information processing occur in which order?
victus00 [196]

Answer:SENSORY STORE, FILTER, DETECTOR, STM.

Explanation:Donald Broadbent in 1958 stated one of the earliest theory of attention,he stated that physical features of messages are used to select one message for further processing and that all others are lost.This differs from inattentional blindness, which is when you focus hard on something and fail to notice unexpected things entering your visual area. He believes that

Information from all of the stimuli presented at any given time enters a sensory buffer with unlimited capacity.

3 0
3 years ago
Problem statement: Using loop, write a program that will ask the user to enter a character for left or right. Then, the user wil
zvonat [6]
Define variables
left is l
right is r

Ask input
left or right

Ask input value

Equate l or r to the input value

Show ladder with steps equal to input value and in the side of input variable
7 0
3 years ago
What methods could you use to set up printing in an organization?
shutvik [7]

The used to set up printing in an organisation are as follows;

  • Connecting directly to the printer
  • setting up a print server
  • using a cloud service to set up printers.

<h3>Method for printing in organisation.</h3>

There are different method for setting up printing in an organisation.

They include the following;

  • Connecting directly to the printer : directly connecting a printer; From small to large organizations, you have lots of ways to set up a printer.
  • setting up a print server
  • using a cloud service to set up printers. There are numerous cloud service that could render this service like goggle.

learn more on printing here: brainly.com/question/14668983

#SPJ11

3 0
2 years ago
Other questions:
  • The chief reason that family and friends are frequent targets of aggression is that
    6·1 answer
  • Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data
    13·1 answer
  • Write two cin statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a dash,
    7·1 answer
  • Such a class might store information about the account balance, the name of the account holder, and an account number. What inst
    13·1 answer
  • Create a PHP page that contains an array of at least 20 movie titles or book titles (your choice). The HTML page should have an
    7·1 answer
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
  • Que se encarga de notar lo que pasa alrededor
    8·1 answer
  • Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies.
    5·1 answer
  • What critical-thinking tool is being used when asking the question, "Is there a large enough scope of
    10·1 answer
  • Write a program that accepts the lengths of three sides of a triangle as inputs. the program output should indicate whether or n
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!