this part of the computer fetches instructions, carries out the operations commanded by the instructions, and produces some outcome or resultant information.

Answers

Answer 1

The CPU part of the computer retrieves instructions, executes the operations ordered by the instructions, and generates some output or resulting information.

A computer program's instructions are carried out by electronic equipment known as a central processing unit (CPU), often known as a central processor, main processor, or simply processor. The program's instructions are used by the CPU to carry out fundamental mathematical, logical, controlling, and input/output (I/O) functions. In contrast, exterior components like main memory and I/O circuitry[1] and specialized processors like graphics processing units are internal (GPUs).

Although the shape, functionality, and implementation of CPUs have changed throughout time, their core functionality has remained largely constant. The arithmetic-logic unit (ALU), which executes arithmetic and logic operations, the processor registers, which provide operands to the ALU and store the outcomes of ALU operations, and the control unit, which coordinates the fetching of data from memory are the main components of a CPU (from memory).

Learn more about CPU here

https://brainly.com/question/16254036

#SPJ4


Related Questions

a laptop that you previously purchased was shipped with so-dimm memory to accommodate the laptop's form factor. you would now like to upgrade the memory.

Answers

The option to upgrade a laptop's memory is dependent on one major factor: The Purpose for which the laptop will be used.

What is the explanation for the above?

Just like you'd need an SUV or tow truck to tow equipment or mobile home, and a tractor for agricultural purposes, laptops come with standard specs but with the flexibility to upgrade to accommodate the work requirements or tasks of its use.

Hence a gamer would require more RAM and processing power compared to someone whose job is writing and working with desktop publishing tools.

Hence, it is correct to state that the workload expected to be put on the laptop will determine if an upgrade to the Random Access Memory will be required.

Learn more about laptop memory:
https://brainly.com/question/28501534
#SPJ1

1. The large and powerful computers which are used in air-conditioned rooms are called (a) Mainframe computers (b) microcomputers (c) Minicomputers (d) Supercomputers.​

Answers

Answer:
Mainframe computers.
Explanation:
"Mainframe computers occupy specially wired, air-conditioned rooms. Although not nearly as powerful as supercomputers, mainframe computers are capable of great processing speeds and data storage. For example, insurance companies use mainframes to process information about millions of policyholders."

Please help me ASAP!!!

Answers

Answer:

The answer to 6 = Systems,

The answer to 9 = Web.

What term is used to describe how mobile computing allows individuals to initiate real-time contact with other systems anywhere, any time since they carry their mobile device everywhere?.

Answers

Broad reach  term is used to describe how mobile computing allows individuals to initiate real-time contact with other systems anywhere, any time since they carry their mobile device everywhere.

What exactly does mobile computing communication entail?

A form of communication known as mobile communications does not require a direct physical link between the sender and the recipient. During conversation, it makes it easier for users to travel from one physical location to another.

Most popular forms of technology for communication-

GSM stands for Global Systems for Mobile Communications.Orthogonal Frequency Division Multiplexing (OFDM) is a technique used in the Long Term Evolution (LTE), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunication System (UMTS) systems.

Learn more about mobile communications

brainly.com/question/14781388

#SPJ4

problem 7 network address address class default subnet mask custom subnet mask total number of subnets total number of host addresses number of usable addresses number of bits borrowed 10.0.0.0 /16 what is the 11th subnet range? what is the subnet number for the 6th subnet? what is the subnet broadcast address for the 2nd subnet? what are the assignable addresses for the 9th subnet?

Answers

The 11th subnet range is = 10.10.0.0 to 10.10.255.255

The broadcast address of the 2nd subnet will be = 10.1.255.255

The assignable address range for the 9th subnet will be = 10.8.0.1 to 10.8.255.254

5 is the subnet number for the 6th subnet

Each device has an IP address made up of two parts: the client, also known as the host address, and the server, also known as the network address. A DHCP server or a user must manually configure IP addresses (static IP addresses). The subnet mask divides the IP address into host and network addresses, designating which portion of the address belongs to the device and which to the network. A gateway, also known as the default gateway, joins local devices to other networks. As a result, whenever a local device wants to send data to a device with an IP address on a different network, the gateway receives the packets first and then passes them on to the intended recipient outside of the local network.

Learn mor about Subnet here:

https://brainly.com/question/15055849

#SPJ4

What is the possible output of the following?

r = random.random() + 1

print(r)

Group of answer choices

1.0 <= r < 2.0

1.0 <= r <= 2.0

1.0 < r <= 2.0

1.0 < r < 2.0

Answers

Considering the definition of the python function random, a possible output for the following code is:

1.0 <= r <= 2.0.

What is the possible output for the given code?

The calculation of the value of r is given as follows:

r = random.random() + 1

The command random.random() returns a random value between 0 and 1, inclusive.

Then, the number one is added to the value stored at variable r.

The minimum value that can be stored at r is of 1, when the function random.random() returns it's minimum value of 0, then r = 0 + 1 = 1.The maximum value that can be stored at r is of 2, when the function random.random() returns it's maximum value of 1, then r = 1 + 1 = 2.

Then the interval that represents the possible outputs for the function is:

1.0 <= r <= 2.0.

More can be learned about python functions at https://brainly.com/question/15185464

#SPJ1

23.21 lab: reverse vector complete reverse() function that returns a new character vector containing all contents in the input argument reversed. ex: if the input vector is: ['a', 'b', 'c'] then the returned vector will be: ['c', 'b', 'a'] 424384.2897294.qx3zqy7

Answers

#include <bits/stdc++.h>

//Defining our vector.

std::vector<char> idx;

int main(int argc, char* argv[]) {

   //We will fill our vector with input from the user.

   std::cout << "How many characters: ";

   int a; std::cin >> a;

   for(int i=0;i<a;i++) {

       char temp;

       std::cin >> temp;

       idx.push_back(temp);

   }

   //Reversing.

   reverse(idx.begin(), idx.end());

   //Clearing the window first

   system("clear");

   //Print the reversed vector.

   std::cout << "Reversed: [";

   for(auto const& i: idx) {

       if(i==idx.at(a-1)) std::cout << i;

       else std::cout << i << ", ";

   }

   std::cout << "]\n";

   return 0;

}

modify short names by deleting the first element and changing the last element to joe. sample output with input: 'gertrude sam ann joseph' ['sam', 'ann', 'joe']

Answers

The above problem is a simple programming prompt resolved using Phyton. See the relevant code below.

What is Phyton?

Guido van Rossum created Python, an interpreted, object-oriented, high-level programming language with dynamic semantics. It was first published in 1991.

Its design concept prioritizes code readability by employing heavy indentation. Python is garbage-collected and dynamically typed. It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming.

Hence the above result is achieved using the following code:

user_input = input()

short_names = user_input.split()

short_names.pop(0)

short_names[-1] = 'Joe'

print(short_names)

The above code can be run on a Phyton compiler online or offline.

Learn more about Phyton:
https://brainly.com/question/26497128
#SPJ1

Full Question:
Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph'. Solve this problem with python

implement a method that combines the stability of the bisection method with the fast convergence of newton’s method. this will require a combined approach, using newton’s method when possible and taking iterations with the bisection method whenever newton’s method does not converge. make the implementation of each method as clear as possible using separate functions that are easy to grade. display the following as output to the console:

Answers

Using the knowledge of computational language in python it is possible to describe a method that combines the stability of the bisection method with the fast convergence of newton’s method.

Writting the code:

def findzero(a, b, tol, maxit, f, df):

# Input:

# a, b = The endpoints of the interval

# tol = The required tolerance

# maxit = Maximum number of iterations

# f, df = The function and its dericative

# Output:

# star = approximation of root

# niter = number of iterations for convergence

# ierr =

# 0, the method converged

# 1, df was singular

# 2, maximum number of iterations has been reached

# Approximating the root

xi_1 = x0 = approximation_of_x0(a, b, f, 100)

# xi_1 is xi-1

for i in range(1, maxit + 1):

# Check if df is singular i.e df(xi_1) is equal to 0

if df(xi_1) == 0:

xstar = xi_1

ierr = 1

niter = i

break

# Calculate next x using Newton Method xi-1 i.e xi_1

xi = Newton_method(xi_1, f, df)

# Check if xi is in [a, b]

if xi >= a and xi <= b:

xi = (a + b)/2

# Check for Convergence

if abs(xi - xi_1) <= tol:

niter = i

xstar = xi

if i == maxit:

ierr = 2

else :

ierr = 0

break

# Check the third condition

if f(a)*f(xi) <= 0:

b = xi

else :

a = xi

# Check if maxiterations are completed

if i == maxit:

xstar = xi

ierr = 2

niter = i

# break

xi_1 = xi

return xstar, niter, ierr

def Newton_method(xi_1, f, df):

xi = xi_1 - (f(xi_1)/ df(xi_1))

return xi

def approximation_of_x0(a, b, f, iterations):

# Using bisection method to approximate the intial root

# if you want to approximate with more accuracy just increase the number of iterations

for i in range(iterations):

xi = (a + b)/2

if f(a)*f(xi) <= 0:

b = xi

else :

a = xi

x0 = (a + b)/2

return x0

# To check the code. i have tested on the sample function

# f = x^2 - 4 i.e 2 is the root of f

# df = 2*x

def f(x):

return (x**2) - 4

def df(x):

return 2*x

a, b = [0, 100]

tolerance = 10**-3

maxit = 19

xstar, niter, ierr = findzero(a, b, tolerance, maxit, f, df)

print("xstar : ", xstar)

print("niter : ", niter)

print("ierr : ", ierr)

if ierr == 0:

print("the method converged")

elif ierr == 1:

print("df was singular")

else:

print("max iterations are reached")

See more about python at brainly.com/question/19705654

#SPJ1

write a program that takes three integers as input: low, high, and x. the program then outputs the number of multiples of x between low and high inclusive. ex: if the input is: 1 10 2 the output is: 5 python

Answers

#Code in python

print("ENTER LOW, HIGH AND X")

low=int(input())

high=int(input())

x=int(input()) c=0

for i in range(low,high):  

if i%x==0:  

c++

print(c)

Python is an object-oriented, dynamically-semantic, interpreted high-level programming language. Its high-level built-in data structures, along with dynamic typing and dynamic binding, making it particularly appealing for use in rapid application development as well as as a scripting or glue language to join together preexisting components.  Python's syntax is also straightforward and quick to learn. Python allows packages and modules, which promotes the modularity and reuse of code in programs. For all popular systems, the Python interpreter and the comprehensive standard library are free to download in source or binary form and can be shared without restriction. Because Python increases efficiency, programmers frequently fall in love with it. The cycle of edit-test-debug is extremely quick because there is no compilation stage. Python scripts are simple to debug because a defect or incorrect input will never result in a segmentation fault. Instead, an exception is raised when the interpreter finds a mistake.

Learn more about python here:

https://brainly.com/question/13437928

#SPJ4

Common methods of securing an IT system do NOT include

A) protecting system integrity by using antimalware programs

B) protecting data integrity by unblocking unauthorized access

C) protecting data integrity by creating backups, entering and editing data correctly

D) setting permissions to restrict access

Answers

Common methods of securing an IT system do not include B) protecting data integrity by unblocking unauthorized access.

What purposes do IT systems serve?

An information technology system (IT system) is typically an information system, a communications system, or, more specifically, a computer system, that has about all peripheral devices, software, as well as hardware, that is used by a little number of IT users.

They include:

Make a backup of your data.Use secure passwords.When working remotely, use caution.Install malware and antivirus protection.

Note that it does not include option B because that cannot guarantee system security.

Learn more about IT system from

https://brainly.com/question/25720881
#SPJ1

the only difference between the get function and the >> operator is that get reads the first character typed, even if it is a space, tab, or the [enter] key.

Answers

True, the only difference between the get function and the >> operator is that get reads the first character typed, even if it is a space, tab, or the [enter] key.

What are functions and operators?

In programming terms, an operators used to manipulate individual data items and return a result while functions are blocks of organized, reusable code that is used to perform a single, related action.

They are different operators and they include:

Arithmetic Operators Assignment Operators Comparison Operators Concatenation Operators Logical Operators Boolean Operators

Learn more about Operators from:

https://brainly.com/question/26680966?referrer=searchResults

SPJ4

The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database before it is implemented.

Answers

The designers of a database typically begin by developing a​ Data model to construct a logical representation of the database before it is implemented.

What is a data model?

A data model  in database is a type of data model that determines the logical structure of a database. It fundamentally determines in which manner data can be stored, organized and manipulated. They are three primary data models namely: relational, dimensional, and entity-relationship (E-R).

Learn more on Database model from:

https://brainly.com/question/17081023?referrer=searchResults

#SPJ4

a. host a is sending host b a large file over a tcp connection. assume host b has no data to send host a. host b will not send acknowledgments to host a because host b cannot piggyback the acknowledgments on data. b. the size of the tcp rwnd never changes throughout the duration of the connection. networks, homework 3. instructor: rajendra v. boppana 220918 2 c. suppose host a sends host b a large file over a tcp connection. the number of unacknowledged bytes that a sends cannot exceed the receive buffer size. d. suppose host a sends a large file to host b over a tcp connection. if the sequence number for a segment of this connection is m, then the sequence number for the subsequent segment will necessarily be mm 1. e. the tcp segment has a field in its header for rwnd. f. suppose that the last samplertt in a tcp connection is 1 sec. the current value of timeoutinterval for the connection will be ≥ 1 sec. g. suppose host a sends one segment with sequence number 38 and 4 bytes of payload over a tcp connection to host b. in this same segment, the acknowledgment number is necessarily 42.

Answers

A)False Host b can send acknowledgment.

B)False rwnd can change during TCP connection.

C)True rwnd is less than rcvr buffer.

D)False It is not required.

E) True size of file is 16 bite.

G)False acknowledgment number will not be 42.

The Transmission Control Protocol (TCP), a communications standard that enables computer hardware and software to exchange messages over a network, is referred to by the abbreviation "TCP." It is made to transmit packets across the internet and guarantee the successful transmission of data and messages through networks. Numerous internet applications, including as the World Wide Web (WWW), email, File Transfer Protocol, Secure Shell, peer-to-peer file sharing, and streaming video, heavily rely on TCP. To provide dependable packet transfer over IP, a transport protocol called TCP is used. Many of the issues associated with packet-based messaging, including lost, out-of-order, duplicate, and corrupted packets, are addressed by the mechanisms built into TCP.

Learn more about TCP here:

https://brainly.com/question/23854731

#SPJ4

when configuring the virtual network for a vm in vmware workstation, which network adapter option should you choose if you want the vm to have an ip address that works on the physical network?

Answers

When setting up a virtual network for a virtual machine in VMware Workstation, you should choose the Bridged network adapter option if you want the virtual machine's IP address to work on the actual network.

When it's not possible to connect devices directly to a router or switch, a bridge enables you to connect two or more network segments together, allowing devices to join the network. If your business or home is a mixed-network setting, network bridging can be helpful. A mixed network is one that consists of some computers connected via Ethernet cables and others using wireless routers. A series of desktop hypervisor solutions called VMware Workstation enables users to run virtual machines, containers, and Kubernetes clusters.

learn more about Bridge network here

https://brainly.com/question/10920464

#SPJ4

you have an azure virtual machine named computer5 and a recovery services vault named vault5. computer5 contains the following data disks: diska has a size of 512 gb diskb has a size of 30 tb diskc has a size of 26 tb diskd has a size of 2.0 tb which data disks can you back up to vault5?

Answers

The data disks that you can back up to Vault5 are: DiskA, DiskB, DiskC, and DiskD.

What is a hard disk drive?

A hard disk drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed.

What is virtualization?

Virtualization simply refers to the creation of an abstract layer over computer hardware primarily through the use of a software, in order to enable the operating system (OS), storage device, server, etc., to be used by end users over the Internet such as a Virtual machine (VM).

In Computer technology, a Virtual machine (VM) that is integrated with a recovery service can be used to back up hard disk drive with a data storage space that ranges from 512 gigabyte (GB) to 30 terabyte (TB).

Read more on hard-disk here: brainly.com/question/26382243

#SPJ1

Complete Question:

You have an Azure virtual machine named Computer5 and a Recovery Services vault named Vault5. Computer5 contains the following data disks:

• DiskA has a size of 512 GB

• DiskB has a size of 30 TB

• DiskC has a size of 26 TB

• DiskD has a size of 2.0 TB

Which data disks can you back up to Vault5?

Select only one answer.

DiskA only

DiskB only

DiskC only

DiskD only

DiskA, DiskB, DiskC, and DiskD

Answer: DiskA, DiskB, DiskC, and DiskD

Explanation: 512 gigabyte (GB) up to 30 terabyte (TB) is supported.

write a function drivingcost() with input parameters milespergallon, dollarspergallon, and milesdriven, that returns the dollar cost to drive those miles. all items are of type double. the function called with arguments (20.0, 3.1599, 50.0) returns 7.89975.

Answers

A function driving cost() with input parameters miles per gallon, dollars per gallon, and miles driven, that returns the dollar cost to drive those miles.

our program must define and call a function:

double DrivingCost(double drivenMiles, double milesPerGallon, double dollarsPerGallon)

#include <stdio.h>

double DrivingCost(double drivenMiles, double milesPerGallon, double dollarsPerGallon)

{

double dollarCost=drivenMiles/milesPerGallon*dollarsPerGallon;

return dollarCost;

}

int main()

{

double milesPerGallon=20.0, dollarsPerGallon=3.1599;

double cost=DrivingCost(10,milesPerGallon,dollarsPerGallon);

printf("%0.2lf ",cost);

cost=DrivingCost(50,milesPerGallon,dollarsPerGallon);

printf("%0.2lf ",cost);

cost=DrivingCost(400,milesPerGallon,dollarsPerGallon);

printf("%0.2lf\n",cost);

return 0;

}

Learn more about Gallon here-

https://brainly.com/question/9917229

#SPJ4

question 3. (30 pts) (6 points each) consider the following relations. the key fields are bold and underlined. employee (ssn, name) project1 (id, name, mgr ssn) work on (ssn, id, year)

Answers

Designed for managing data stored in a relational database management system, SQL is a database language. IBM created SQL for the first time in the early 1970s (Date 1986).

The original SEQUEL (Structured English Query Language) version was created to access and handle data held in IBM's System R quasi-relational database management system. The first SQL implementation to be made commercially available was Oracle V2, which was released for VAX systems in the late 1970s by Relational Software Inc., later to become Oracle Corporation. In this chapter, we'll concentrate on utilizing SQL as a data defining language to build databases and table architectures (DDL).

Learn more about database here-

https://brainly.com/question/6447559

#SPJ4

e usually use a statistic to help determine which model the evidence points towards. what is a statistic that we can use to compare outcomes under emily’s model to what was observed? assign valid stat to an array of integer(s) representing test statistics that emily can use:

Answers

Social media have significantly increased in popularity in recent years and give people the chance to network, interact, and share globally.

Social networking sites are becoming an increasingly significant part of students' daily life, thus it's crucial to comprehend how technology affects the learning process. Even though university students use social media frequently, little research has examined in-depth how much they are embracing particular social media for learning. This study used a mixed-methods approach with three stages to look into how students utilize social media, and particularly social network sites, to promote learning. In the first step, data from an online survey of 812 university students regarding their use of social media was statistically analyzed.

Learn more about Network here-

https://brainly.com/question/15088389

#SPJ4

100 POINTS. BAD ANSWERS WILL BE REPORTED. GOOD ANSWERS MARKED FOR BRAINLIEST. WON'T HESITATE TO REPOST.
Which of the following programs are command-line programs?

All programs written in IDLE
Programs that are called via CLI
Programs that are called via graphics
Programs that need GUI to execute

Answers

Answer:  The correct answer is Programs that are called via CLI

Explanation:  Command Line Interface applications (CLI) are typically used to call other CLI programs, batch files or command prompt executables. Command-line interfaces are also referred to as command-line user interfaces, console user interfaces, and character user interfaces, though their intended use varies. CLI input can be entered as input commands by the keyboard and then run by the computer.

Answer:

Programs that are called via CLI.

the other options are non-examples because they are a different category of programs (GUI, graphics, and IDLE).

Match the items with their respective descriptions.

to navigate between worksheets

to protect a worksheet

to change the position of a worksheet

to rename a worksheet

select a password

arrowRight

drag the worksheet tab to the new position

arrowRight

double-click the worksheet tab

arrowRight

press Ctrl and Page Up or Page Down keys

arrowRight

Answers

Answer:  Here are the correct matches:

Select a Password  ---->   to protect a worksheet

drag the worksheet tab to the new position  ---->   to change the position of a worksheet

double-click the worksheet tab  ---->   to rename a worksheet

Press Ctrl and Page Up or Page Down keys  ---->   to navigate between worksheets

Explanation:  Confirmed correct.  :)

question 3 scenario 1, continued now that you’ve created a data frame, you want to find out more about how the data is organized. the data frame has hundreds of rows and lots of columns. assume the name of your data frame is flavors df. what code chunk lets you review the structure of the data frame?

Answers

A code chunk which lets you review the structure of the data frame is  str(flavors_df)

What is a data frame?

A data frame is a two-dimensional table or array-like structure made up of rows and columns. It is typically used for the storage of data using R programming language in R Studio by.

In this scenario, "str()" refers to the function that allows the programmer to review the structure of the data frame while "flavors_df" refers to the name of the data frame which the "str()" function will take for its argument.

Here's the Complete Question:

Now that you’ve created a data frame, you want to find out more about how the data is organized. The data frame has hundreds of rows and lots of columns. Assume the name of your data frame is flavors_df. What code chunk lets you review the structure of the data frame?

str(flavors_df)

summarize(flavors_df)

select(flavors_df)

filter(flavors_df)

Learn more on data frame from:

brainly.com/question/28209816

#SPJ4

given the following pseudocode, which is the argument? module main() call curvescore(82) end module module curvescore(integer score) declare integer newscore set newscore

Answers

The argument is 82 in the provided pseudocodes. Pseudocode is a made-up, informal language that aids in the creation of algorithms by programmers.

The vast majority of programmers are familiar with pseudocode. It allows the programmer to focus solely on the code development process' algorithmic component. It can't be turned into an executable program through compilation. The values that are sent between programs, functions, or subroutines are known as arguments. The argument that is supplied to the function curve in this pseudocode is Score, which is 82 in the main module. The curve Score's is then visible. As a result, the function will assign the score a value of 82. So, 82 is the correct response to this query.

Learn more about Pseudocode here-

https://brainly.com/question/13208346

#SPJ4

tomio has been working as an assistant database analyst for three months. during a recent conversation with his supervisor, tomio explained his goal "to improve his computing skills by the end of the year." is this a smart goal?

Answers

Is this a SMART goal: B) No, SMART goals must be specific and measurable.

What is a SMART goal?

A SMART goal can be defined as a well-established tool that can be used by an individual, a project manager or business organization (company) to plan (create), track, and achieve (accomplish) both short-term and long-term goals.

Generally speaking, SMART is a mnemonic acronym and it comprises the following elements:

SpecificMeasurableAchievable or Attainable.Relevancy (realistic).Time bound (timely)

In conclusion, we can reasonably infer and logically deduce that Tomio's goal is not a SMART goal because it is neither specific nor measurable.

Read more on SMART goal here: brainly.com/question/18118821

#SPJ1

Complete Question:

Tomio has been working as an assistant database analyst for three months. During a recent conversation with his supervisor, Tomio explained his goal "to improve his computing skills by the end of the year." Is this a SMART goal?

A) Yes, SMART goals should set a timeline for being achieved.

B) No, SMART goals must be specific and measurable.

C) No, SMART goals must have a target date.

D) Yes, SMART goals should be results-oriented.

8) a class declared as final .a) cannot be changed.b) cannot have subclasses.c) cannot have superclasses.d) has several abstract methods.e) cannot be used in a program.

Answers

Option c subclasses cannot exist in a class that has been marked as final.

An object is produced from a class, which is a user-defined blueprint or prototype. It stands for the collection of traits or operations that all objects of a particular type share. A class in object-oriented programming is a template that defines the method s and variables in a certain type of object. Since an object has real values rather than variables, it is a specific instance of a class. One of the cornerstones of object-oriented programming is the concept of the class. Therefore, a basic class includes methods and how they are implemented. This class's methods can be used to take an action on the class's data as well as be used to construct an object or objects from the class's data. Inheritance is possible with this class.

Learn more about class here:

https://brainly.com/question/14615266

#SPJ4

Suppose that you want to create a backup of your entire data which is around 10gb. would it be reasonable to use dvds for the purpose of creating this backup? what about bds (blu-ray disks)?

Answers

Answer:yes it would

Explanation:

various cipher machines were developed and used during the two world wars. for example, enigma, schlusselzusatz, purple, etc. it was believed that keeping secret the design of the machines will help boost the security.

Answers

The Enigma machines that Germany utilized in World War II but that the Allies cracked are the most infamous example of cryptography.

A tangible object that carries out a cryptographic function (e.g., random number generation, message authentication, digital signature generation, encryption, or key establishment). For cryptographic operations, a cryptographic device must use one or more cryptographic modules. The number of remaining Enigma machines is unknown, however it is believed that there are a few more "hiding." It is known that there are roughly 300 Enigma devices in museums and private collections around the world.

By doing this, a rotor machine generates an intricate polyalphabetic substitution cipher that alters with each keystroke.

Learn more about cryptographic here-

https://brainly.com/question/14278859

#SPJ4

zach wants to install windows 10 over his existing copy of windows 10. he wants to keep his personal files, apps, and windows settings but freshen up all windows components. he currently has a usb drive with a windows 10 iso. what type of installation will you recommend for zach? a. custom installation b. fresh start installation c. repair upgrade d. network installation

Answers

Answer:

C. Repair upgrade

Explanation:

This option will allow personal files, apps, and settings to be saved while upgrading to Windows 10.

The type of installation you will recommend for Zach is a repair upgrade. The correct option is c.

What is a repair upgrade?

A repair upgrade resolves Windows system problems while retaining your files, programs, and preferences. When your Windows 10 installation becomes erratic or slow, you will attempt anything to solve it, including system file checker, DISM, and check disk, to name a few.

To repair and upgrade to Windows 10, follow these steps:

Close all active applications.Insert the Windows DVD into the DVD drive of your computer.Select Install Now in the Setup window.Select Go online to get the most recent updates for installation (recommended).If prompted, enter the CD key.

Therefore, the correct option is c. repair upgrade.

To learn more about repair upgrades, refer to the below link:

https://brainly.com/question/29242603

#SPJ2

your company has hired an outside security firm to perform various tests of your network. during the vulnerability scan you will provide that company with logins for various systems to aid in their scan. what best describes this?

Answers

In course of the vulnerability scan you will provide that company with logins for various systems to aid in their scan, the term that best describes this is A privileged scan.

What is the  privileged scan about?

Intrusive scans try to take advantage of vulnerabilities once they are discovered. Use intrusive scanning with caution as it may interrupt your operational systems and processes, raise difficulties for your staff and customers, and highlight the potential danger and effect of a vulnerability.

Note that Credential-based vulnerability assessments, which use the admin account, do a more thorough examination by searching for issues that are hidden from network users.

Learn more about vulnerability scan from

https://brainly.com/question/10097616
#SPJ1

(I already wrote the definitions.) Define: arch, vault and dome. Make a schematic diagram of each of them.

Please help me with the diagram

Answers

An arch, as used in architecture, is any method other than a lintel used to cross an aperture. Curves define true arches.  A vault is an arched ceiling or roof made of stone, brick, or concrete; wood or plaster may also be used as an imitation.  A dome is a circular base-mounted vault with an equal curvature.

Who developed the arch vault and dome?

The Etruscans taught the arch to the ancient Romans, who improved it and were the first architects and builders in Europe to use it to its full potential for structures above ground. The benefits of the arch, the vault, and the dome were fully appreciated by Roman builders before anyone else in Europe or possibly the entire world.

Note that a vault is a brick, stone, or concrete ceiling that is said to be constructed using the arch design principle. A tunnel vault, also known as a barrel vault, is a semicircular extension of an arch that resembles a tunnel and can be imagined as an uninterrupted line of arches packed close together, one behind the other.

Learn more about vault and dome from

https://brainly.com/question/8555535

#SPJ1

Other Questions
What is viability factors researches the demand for products or services? in pennsylvania, the broker is providing communication and document preparation services and is assisting both parties in a transaction without advocating for either party. this broker is a: a woman's boxing match consists of four 2-minute rounds, there is a 1-minute rest interval between each round. what information do you know that will help you find how long a boxing match lasts? How do division properties help you evaluate expressions?Drag a word or number to the box to correctly complete the statement.Put responses in the correct input to answer the question. Select a response, navigate to the desired input and insert the response. Responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. Responses can also be moved by dragging with a mouse.When the area of a fraction is equal to 1 and the numerator is nonzero, the value of the fraction is equal to the .Options: numerator, opposite of the numerator, denominator, opposite of the denominator, 0 URGENT!! ILL GIVEBRAINLIEST! AND 100 POINTS A penguin walks south. it completes the first 1/3 mile in 1/5 hour and continues walking at the same rate. what is the penguin's speed in miles per hour? assume you have put your first ball back into the bucket. now, reach in (again, no peeking!), and pick your second ball. (click "pick-a-ball!" to select your second ball.) which ONE OF YALL GOOD AT BIO PLS HELP Which statement is a key idea in the Declaration of Independence?(1 point) Responses People have the right to practice religion freely. People have the right to practice religion freely. The power of government comes from the people. The power of government comes from the people. Governments cannot be changed. Governments cannot be changed. People cannot govern themselves. What is the pressure when 650N is applied over 40m2? Find the slope from the graph.-1/2-4/33/4-3/4 In your own words, what was the purpose of the lab? Find the slope of the line passing through the points (4,9) and (-6,9) What is the sum of all the numbers less than 496 that divide evenly into 496? Find the inverse function in slope-intercept form f(x)=x-5 jay and joyce meet george, the banker, to work out the details of a mortgage. they all expect that inflation will be 2 percent over the term of the loan, and they agree on a nominal interest rate of 6 percent. as it turns out, the inflation rate is 5 percent over the term of the loan. a. what was the expected real interest rate? b. what was the actual real interest rate? c. who benefited and who lost because of the unexpected inflation? Which of the following is not a step in the initiative process?O approval of initiative petition by state or local governmentO collection of signaturesO state-wide vote during a ballot electionO signature or veto by state governor please help asap! i dont know what to do Lucy wants to drink 2L of water.She has poured this amount into a jug. Between breakfast and lunch she pours 2 glasses of water each measuring 250ml.Between lunch and her dinner she pours 3 glasses also measuring 250 ml.How much water does she need to drink before going to bed? 1b. Below is a graph of the equation x + y = 500. Change it so that itrepresents solutions to the inequality representing this situation. Statewhat line you will use (dashed or solid line) and which side you will shade(A or B). **