Does this mechanism increase or decrease speed? Why?

Answers

Answer 1

Answer:

It will increase. Or decreases.

Explanation:

It depends on the mechanism.


Related Questions

Mike gets along with his co-workers and is always helpful to the clients. He demonstrates good _____.



A.interpersonal skills


B.motivation


C.self-confidence


D.efficiency

Answers

I think the answer is A
A thank for the point

True or False? Jerry's company is beginning a new project, and he has been assigned to find a telecommunications tool that will improve operational efficiency. He lists the tasks that he wants the tool to be able to do. Then he does some research to find out what is available. The only thing remaining for Jerry to consider is where he can get the best deal on the technology.

Answers

Answer:

True

Explanation:

Answer:

It's false it took the assessment

your company decides to implement a RAID-5 array on several file servers. Which feature is provided by this deployment

Answers

Answer:

High availability

Explanation:

RAID-5 array is defined as a redundant array for independent disk configuration which makes use of the disk striping with the parity. It consists of a minimum three disk drives and it uses the data striping and the parity data to provide the redundancy.

RAID 5 is a powerful tool to ensure integrity of the data. It provides both performance as well as security to the data.

In the context, "high availability" is the feature that is provided by the deployment of RAID 5 array on the several file services.

A digital designer might do computer animations for video games,
OA
True
OB
False

Answers

True :) because they the person is a digital deigner so he might can do animations for video

Question # 5 Multiple Choice Which statement is true? A binary search can only be used on an ordered group of data values. A binary search is always preferred to a linear search. You can use a binary search in every situation where you use a linear search. You can use a binary search on any group of data values.

Answers

Answer:

A. A binary search can only be used on an ordered group of data values.

Explanation:

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements.

Binary search applies the principles of divide and conquer.

In Computer programming, performing a binary search on an array requires that the array should be sorted in an ascending order i.e from the least to the highest with respect to the data value.

Hence, the true statement is that a binary search can only be used on an ordered (sorted) group of data values.

Answer: Binary Search

Explanation: Other user is correct

How can you use the Address Book to address an email message? Use the drop-down menus to complete the sentences. 1. Type an email contact in the To bar and choose from the options. 2. Click in the ribbon to open the Global Address List.

Answers

Answer:

1. AutoCorrect

2. Address book

Explanation:

stan bts ?

Answer:

1. auto correct

2. address book

Explanation:

Cody needs to print a message to the screen using Python. Which shows the correct way to code a print statement?
Oprint("I can code.")
O print (I can code.)
O print - I can code.
Oprint (I can code);

Answers

Answer:

A. print ("I can code.")

Explanation:

In this scenario, Cody needs to print a message to the screen using Python. The command which shows the correct way to code a print statement is print ("I can code.").

In Python programming, the print () function is used for printing a specific output message. The syntax for the print function includes using double quotation marks to enclose the text (string).

An example of an executable code using Python programming language is;

Print ("1. RED")

Print ("2. BLUE")

COLOR = Int(input("Please select your favorite color by entering a number:"))

If (COLOR == 1);

Print ("You chose Color Red")

elif (COLOR == 2);

Print ("You chose Color Blue")

else;

Print ("You have entered a wrong number")

Answer: A print I can code

20. The following are considered as ICT skills EXCEPT
a. video, audio and text
c. social media managem
b. email management and setup
d. online research

Answers

Answer:

b

Explanation:

How can computational thinking techniques be applied to software development

Answers

in education, computational thinking (CT) is a set of problem-solving methods that involve expressing problems and their solutions in ways that a computer could also execute. It involves the mental skills and practices for designing computations that get computers to do jobs for people, and explaining and interpreting the world as a complex of information processes. Those ideas range from basic CT for beginners to advanced CT for experts, and CT includes both CT-in-the-small (related to how to design small programs and algorithms by single people) and CT-in-the-large (related to how to design multi-version programs consisting of millions of lines of code written in team effort, ported to numerous platforms, and compatible with a range of different system setups).

hope this helped and good luck

Calling all engineers and tech geniuses etc for help! Brainliest for correct answer!

My cousin has this toy walkie talkie which I want to fix. But, it needs batteries to work. There isn’t a label which says but a certain kind of battery in.

So, which battery should I put in to make it work???

Answers

Answer: so the standard battery for any kind device such as walkie talkies or Remotes, commonly use Double A batteries

Explanation:

National laws have been enacted to govern the actions permissible of IT professionals. Most laws governing IT professionals are geared more toward the actions of IT professionals. HIPAA is an example of a law that protects personal information, which all people, including IT professionals, are required to follow. There are no state or local laws that address information accessibility.

Answers

Answer:

C.HIPAA is an example of a law that protects personal information, which all people, including IT professionals, are required to follow.

Explanation:

i got it right

Answer:

A.HIPPA      

Explanation:

Edg 2020

Which uses flowcharts to communicate?
incremental project design
solution modeling
programming code
writing the problem statement

Answers

Answer:

Solution modeling.

Explanation:

Another person already asked this question lol.

:))

Answer:

solution modeling

Explanation:

Hello! Please Answer This One Question!

Write a 50-word summary about Digital Citizenship

Answers

Answer:

The term digital citizenship, also known as e-citizenship or cyber-citizenship, refers to the use of Information and Communication Technologies (ICT), and the principles that guide them, for the understanding of the political, cultural and social issues of a nation.

More Content by Concept

In other words, it is about citizen participation through digital or electronic environments and interfaces, through the Internet and Social Networks.

Digital citizenship is part of the electronic government system or digital democracy, which precisely consists of the administration of State resources through new ICTs and all their potential, to make life easier for citizens.

In this way, a digital citizen has the right to access information online in a safe, transparent and private way, in addition to the social and political participation that 2.0 media allows.

Explanation:

When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means

Answers

Answer:

When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means

Explanation:

When the CPU executes the instructions, it interprets the opcode part of the instruction into individual microprograms, containing their microcode equivalents. Just so you know, a full assembly instruction consists of an opcode and any applicable data that goes with it, if required (register names, memory addresses).

The assembly instructions are assembled (turned into their binary equivalent 0s and 1s, or from now on, logic signals). These logic signals are in-turn interpreted by the CPU, and turned into more low-level logic signals which direct the flow of the CPU to execute the particular instruction.

____ returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.

Answers

Answer:

vecCont.capacity() returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.

Explanation:

Consider the provided information.

vecCont.capacity() is a function that returns the maximum number of elements(without reallocation) that can be inserted into the container.

vecCont.capacity() returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.

with the advent of technology one can experience special features such as 3D theater experiences true or false

Answers

The answer would be true

can someone help me on codehs. its 7.1.5: initials. here is what your supposed to do

Write a function called initials that will take a first and last name and return their initials using the following format:

initials("Tracy", "Turtle")
# => "T.T."
initials("Peter", "Parker")
# => "P.P."

Answers

Answer:

first = input( "What is your first name? " )

last = input( "What is your last name? " )

def initials():

   print ("Your initials are: "+first[0]+"."+last[0]+".")

initials ()

Explanation:

it works when I test but it won't submit. Hope this helps

Following are the program to prints the initials of the input value.  

Program Explanation:

Defining a class Main.Inside the class, a method "initials" is declared that takes two string variables "first, last" in the parameter.Inside the method, a return keyword is defined that uses the charAt method that returns the first character value of the parameters. In the next step, the main method is defined.Inside the main method, a print method is declared that calls initials method that accepts value in the parameter and prints its value.

Program:

public class Main //defining a class Main

{

   static String initials(String first, String last)//defining a String method initials that input two variables in the parameter

   {

       return first.charAt(0)+"."+last.charAt(0)+".";//using charAt method that returns first character value

   }

 public static void main(String[] as) //defining main method

 {

   System.out.println(initials("Tracy", "Turtle"));//using print method that calls initials method that accepts value in parameter

   System.out.println(initials("Peter", "Parker"));//using print method that calls initials method that accepts value in parameter

 }

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/2810164

wap in java to complete the following (16*1) +(14*2) +(12*3) +(10*4) +(8*5) +(6*6) +(4*7)​

Answers

Answer:

It goes like:

public class Program

{

public static void main(String[] args)

{

int j=18;

int sum=0;

for (int i =1; i<7; i++)

{

sum=sum+(i*(j-2));

j=j-2;

}

System.out.println(sum);

}

}

Explanation:

Variables used:

j : controls the first number in product and decreases by 2 each time the loop runs.

sum: saves the values of addition as the loop runs.

A copyright gives the exclusive legal right to the original author or creator to print, publish, perform, record, or produce material.
True
False

Answers

Answer:                

True.                                

Explain: TRUE                                                  

THE ANSWER YOU ARE LOOKING FOR IS TRUE HOPE THAT HELPS

Lilly is new to her company. Give Lilly some advice about effective communication in an e-mail. Include a subject line.

Answers

Effective communication is an important aspect throughout all aspects of life, but it is especially important when in a new job. This is because your communication, or even lack of communication could very likely change you or a co-workers life. For example, let's say a co-worker needed you to do something, and you couldn't do it, but didn't tell them, then they could get into trouble and potentially fired for not doing the work that they entrusted to you. In some cases, they'll blame you, and you can get fired.

Drag each tile to the correct box.
Match the type of server to its primary function.
proxy server
web server
FTP server
email server
stores and exchanges messages
filters content and stores data for faster access
stores text, images, and other media that make up a website
stores and provides files for download

Answers

Answer:

Explanation:

web server= stores text, images, and other media that make up a website

email server= stores and exchanges messages

Proxy server= filters content and stores data for faster access

FTP server= stores and provides files for download

Matching each type of server to its primary function, we have:

Email server: stores and exchanges messages.

Proxy server: filters content and stores data for faster access.

Web server: stores text, images, and other media that make up a website.

FTP server: stores and provides files for download.

A server can be defined as a specialized computer system that is designed and configured to store and provide specific remote services for its end users (clients), especially on a request basis.  

In Computer and Technology, the different types of server include:

Print server.Web server.Database server.File server.Virtual server.Proxy server.Application server.

I. Email server: it stores and exchanges messages between two or more users.

II. Proxy server: it is designed to filter content of a database and store data for faster access.

III. Web server: it stores text, images, video and other media that make up a website.

IV. FTP server: it stores and provides files for download and sharing between two or more users.

Read more: https://brainly.com/question/21078428

In which phase of the ethical hacking methodology would a hacker be expected to discover available targets on a network

Answers

Answer:

Scanning and enumeration.

Explanation:

In the scanning and enumeration phase of the ethical hacking methodology, a hacker would be expected to discover available targets on a network.

The scanning and enumeration phase of the ethical hacking follows the reconnaissance phase and it typically involves discovering available targets on a network for informations such as username, password, IP address etc.

Given the arra
explorer", "testa", "hummer", "corvette", "civic", "mustang"), what is the element in index 2 A.corvette
B.hummer
C.explorer
D.tesla

Answers

Answer: B. hummer

Explanation:

Given the array :

Given the arra

("explorer", "testa", "hummer", "corvette", "civic", "mustang")

Array indexing usually begins from 0

That is ; the first element in the array is indexed as being in position 0

Using the given array as an example :

Index ____ element

0 ______ explorer

1 _______ tester

2 _______hummer

3 _______ corvette

4 _______ civic

5 _______ mustang

Hence, element in index 2 of the array is hummer

planning for memorable Christmas celebration with your family​

Answers

Answer: good for you

Explanation:

Answer:

too cool in kkkkkkk

Explanation:

hiiiiiiiiiiiiiiii

If you were describing system software for your car, what would be the functions of the system software?
A) program its own GPS system
B) control how all the systems operate
C) turn on and run through a self-diagnostics test
D) diagnose all the connected systems

Answers

B would be the correct answer

what dog breed is this
a chow chow
b Siberian husky
c Portuguese pondego
d toy poodle
click picture for example

Answers

Answer:

C i'm pretty sure

Explanation:

Hope i help

what gaming PC should I get

Answers

Answer:

ps5

Explanation:

might as well buy a ps5 at this point

Write a program that takes three numbers as input from the user, and prints the largest.

Answers

Answer:

I'll be using python:

__________________________

a=int(input("Enter a number :"))

b=int(input("Enter another number :"))

c=int(input("Enter last number :"))

lis=[a,b,c]

sort=sorted(lis)

print("The largest number is:", sort[1])

___________________________

write a paragraph explaining why you think its important to use ethics in computers

Answers

Answer:

cause its gay

Explanation:

Draw a circle with radius 2cm and display its perimeter

Answers

Answer:

12.57

Explanation:

circumference =

[tex]2\pi r = [/tex]

[tex]2 \times \frac{22}{7} \times2[/tex]

[tex] = 12.57[/tex]

Other Questions
Please help me.. I will give you 20 points !!When is a secondary source more helpful than a primary source?O A. When you want to know the exact data valuesB. When you do not need to know the conclusion of the experimentC. When you want to confirm the conclusion with your ownexperimentD. When you are not an expert in the field being studied in theexperiment what does < mean in orchestra Solve the system of linear equations usingsubstitution. SHOW ALL WORK FORCREDIT.4x - 2y = -10x = -2 Example 24 In a school there are 20 teachers who teach mathematics or physilthese, 12 teach mathematics and 4 teach both physics and mathematics. How Exteach physics ? where do i plot (7,2) on a graph? What is 424 = 87 Enter the answer in the box. someone help me im gonna fail if i dont ill mark brainliest StepGivenWork12 +1-(6= 1)2+1 - (12)2+ (12)12432 + 3451 WILL GIVE BRAINLIEST!!!!!!!!!The Port of New Orleans is not considered an intermodal port.TrueFalse If you help me with this question Ill give you Brilliant. Match the good transported though the triangular trade route to the regions that sold the good give connotative meaning of clouds Please help me if you good at science Im over here struggling Ill mark brainliest :) I need help as fast as possible Area of HealthImpactStatementsMy grandma gives me the bestadvice. I'm so lucky to have her inmy lifeAfter school, I enjoy jogging.While unhealthy food tastes good,I try to eat healthy foods most ofthe timeI relieve stress by reading a goodbookMy friends are amazing. They arealways there for me and encourageme to be the best I can beI always try my best at schoolINTLWhile it is tempting to stay up lateand play on social media, I try togo to bed early,16 In which of the following circumstances would a cell undergo apoptosis?DNA damage in a cell cannot be repaired at a cellular checkpoint.A cell becomes cancerous.A cell successfully completes the G1 phase of the cell cycle.A cell successfully completes the M phase of the cell cycle? can someone help me with this please? what goes in the empty boxes?! HELP second page only one person understand Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things. A group of science students plans to take an SRS of 25 days in the year to see what proportion of days sampled have a low below 0C in a particular city. Suppose that 41\% of days in the city have a low temperature below 0 C Let represent the proportion of