1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
3 years ago
9

VAX is an example of a:​

Computers and Technology
1 answer:
Dmitry_Shevchenko [17]3 years ago
8 0

Answer:

VAX architecture is an example of the CISC (Complex Instruction Set Computers) therefore there are large and complicated instruction sets used in the system. Memory: VAX architecture consists of 8- bit bytes memory

You might be interested in
Question 1 (3 points)
Sloan [31]

Answer:

18 years of age in California

Explanation:

6 0
3 years ago
Read 2 more answers
What is the name of the program that takes high-level code and transforms it into machine-level code?
Olenka [21]
These are known as compilers. They take high level software like java and translates it into simple code like binary.
5 0
3 years ago
You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
irga5000 [103]

Answer:

Port security and violation mode.

Explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

4 0
3 years ago
3.24 LAB: Seasons
AveGali [126]

Answer:

Seasons Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day. Ex: If the input is: April 11 the output is: Spring In addition, check if the string and int are valid (an actual month and day). Ex: If the input is: Blue 65 the output is: Invalid Invalid The dates for each season are: Spring: March 20 - June 20 Summer: June 21 - September 21 Autumn: September 22 - December 20 Winter: December 21 - March 19 LAB ACTIVITY 3.24.1: LAB: Seasons 0/10 main.cpp Load default template... 1 #include eam> 2 #include <string> 3 using namespace std; 4 5 int main() 6 string inputMonth; 7 int inputDay; 8 9 cin >> inputMonth; 10 cin >> inputDay; 11 12 /* Type your code here. */ 13 14 return; 15 }

3 0
3 years ago
You are given a graph G = (V, E) with positive edge weights, and a minimum spanning tree T = (V, E’) with respect to these weigh
matrenka [14]
C vraiment très facile
Si tu a besoin d’aide recontacter moi
7 0
3 years ago
Other questions:
  • PLEASE HURRY
    6·1 answer
  • What is our goal for a hashing function?
    14·2 answers
  • Laura wants to know more about the organization to which she has applied. What can she do to know more about the organization’s
    12·1 answer
  • _____ provides vital protection and maintenance services for system hardware and software, including enterprise computing system
    12·1 answer
  • Which of the following is the definition of registration authority ( RA)?
    10·1 answer
  • Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure ou
    5·1 answer
  • If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​
    12·1 answer
  • You wrote a program to find the factorial of a number. In mathematics, the factorial operation is used for positive integers and
    14·2 answers
  • How would you design an adaptive environment for people who are blind?
    10·1 answer
  • Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!