hy plzz help me friends​

Hy Plzz Help Me Friends

Answers

Answer 1

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

Answer 2

Answer:

Ram which stands for random access memory, and Rom which stands for read only memory are both present in your computer. Ram is volatile memory that temporarily stores the files you are working on. Rom is non-volatile memory that permanently stores instructions for your computer


Related Questions

Can i get any information on this website i'd like to know what its for ?
https://www.torsearch.org/

Answers

Explanation: torsearch.org is a safe search engine mainly used for dark wed purposes. It does not track your location nor give any personal information.

((PLEASE HELP ME)) i need to get all my school work done before thursday
------------- are used to navigate between pages and Web sites.

Question 1 options:

Transitions


Animations


Hyperlinks


None of the above

Answers

Answer:

none of the above

Explanation:

Web navigation refers to the process of navigating a network of information resources in the World Wide Web, which is organized as hypertext or hypermedia. The user interface that is used to do so is called a web browser.

6) Read the article posted on The Verge entitled How to fight lies, tricks, and chaos online and summarize the four steps. Then answer the following: Are these four steps enough guidance to help us discover truth in this day and age? Justify your answer with supporting arguments.​

Answers

Answer:

A. Summarily, the four steps to accurately sharing information include;

1. consciously employing our senses to examine news deeply so as to accurately determine their source and purpose.

2. determining the origin of the story so as to know when and where it stems from.

3. examining the context of the material so as to find inconsistencies.

4. analyzing the evidence, arguments and information being presented in the story.

B. The four steps presented in the story are enough guidance to help us differentiate between accurate and false information on the net.

I agree with all of the points presented by the author of this article on analyzing information found online. Recently, I viewed a video on the net which was presented as a fact but a little digging revealed that the original video was a prank that had been edited, so as to remove important details. The first point raised by the speaker which is honing my senses to know that something is wrong with the information (it was too bad to be true), helped me to dig deeper. I found a link to the original video that revealed a completely different detail from what I had just seen.

Explanation:

For people who care that the information they share online are true, the points raised by the author of the article, "How to fight lies, tricks, and chaos online", can prove beneficial. The first step is applying one's senses to know when an information is too bad or good to be true. The next step is determining the origin of the story. When and where a story comes from is crucial to knowing if it is truly relevant.

Thirdly, reading in between lines might reveal that the story is deceitful and lacks truth or originality. Lastly weighing the evidence of the story will help the reader in knowing the usefulness of the story to him.

how to check if serial interface is dte ot DCE?

Answers

If you can see the DTE/DCE cable, you can tell by looking which router has the DCE interface connected to it - the letters "DTE" or "DCE" will either be molded into the connector itself, or if it's an older cable there should be a little piece of tape on the cable that tells you what the interface type is.

What is a key consideration when evaluating platforms?

Answers

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance (number of keys) from that key, and r is 2(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies.

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:

print('{:.2f} {:.2f} {:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3, your_value4, your_value5))

Ex: If the input is:

440
(which is the A key near the middle of a piano keyboard), the output is:

440.00 466.16 493.88 523.25 554.37

Answers

Answer:

In C:

#include <stdio.h>

#include <math.h>

int main(){

   float f0,r,temp;

   r = pow(2.0,1.0/12);

   printf("f0: ");    scanf("%f", &f0);

   temp = f0;

   for(int i = 0; i<=4;i++){

       f0 = f0 * pow(r,i);

       printf("%.2lf ", f0);

       f0 = temp;    }

   return 0;

}

Explanation:

This declares f0, r and temp as float

   float f0,r,temp;

This initializes r to 2^(1/12)

   r = pow(2.0,1.0/12);

This prompts the user for f0

   printf("f0: ");    scanf("%f", &f0);

This saves f0 in temp

   temp = f0;

This iterates the number of keys from 0 to 4

   for(int i = 0; i<=4;i++){

This calculates each key

       f0 = f0 * pow(r,i);

This prints the key

       printf("%.2lf ", f0);

This gets the initial value of f0

       f0 = temp;    }

   return 0;

grade 11 essay about the year 2020​

Answers

Answer:

This 2020 have a new normal class because of CO VID-19 Disease have more students and teachers patient the teachers is preparing a module to her/his student and the student is answering are not learning lesson because of the COV ID-19 the whole word enduring to that pandemic and all fronliners is the hero in this pandemic because all frontliners is helping the people to we heal and to healed that virus.

Explanation:

Take the program written last weekend that creates a deck of cards, shuffles them, and then lists them out. Modify the program to 'deal' two hands of cards (two players). Each player will be dealt 5 cards. Deal one to the first player, then one to second player. Repeat until both players have 5 cards in their hand. Then compute the total points in each player's hand and determine the winner with the most points. If a player has an ace, then count that as 11 points. Print out the winning player total points and then his cards. Then print out the losing player total points and his cards. Turn in both your code and a copy of the screen output.

Answers

Answer: Here, you might need to make some changes to format it how you'd like, but it gives you the desired output :)

Explanation:

import random as chunky

def play():

   hand1, hand2 = [], []

   for n in range(5):

       hand1.append(chunky.choice(cardList))

       hand2.append(chunky.choice(cardList))

   print("Hand 1: ", end= "")

   for n in hand1:

       print(n, end= " ")

   print()

   print("\nHand 2: ", end= "")

   for n in hand2:

       print(n, end= " ")

   print()

   while "A" in hand1:

       hand1[hand1.index("A")] = 11

   while "A" in hand2:

       hand2[hand2.index("A")] = 11

   print(f"\nHand 1 Total: {sum(hand1)}  Hand 2 Total: {sum(hand2)}")

   print("\nHand 1 WINS!") if sum(hand1) > sum(hand2) else print("\nHand 2 WINS!")

cardList = [1,2,3,4,5,6,7,8,9,10,"A"] #Skipped King, Queen, and Jack. Did not know how to incorperate them

chunky.shuffle(cardList)

looper = True

while looper == True:

   play()

   x = input("\n\nWould you like to go again?(y/n): ")

   if x.lower() == "n":

       quit()

Question 2 (10 points)
enables you to view data from a table based on a specific
A-
criterion
Query
Report
Form
All of the above

Answers

Answer: Query

Explanation:

A query simply enables one to view data from a table based on a specific criterion.

We should note that a query is simply referred to as a precise request that is used when retrieving information with the information systems.

When requesting for the data results, and also for the request of some certain action on data, the query is used. If the user wants to perform calculations, answer a particular, make adjustments to w table etc, the query is used.

Your co-worker who went to UCLA tells you that DHCP is not enabled at your new job, so you should just use the same IP address that you have at home to connect to the internet. He told you it should work because your computer is communicating with a unique public IP address at home, so no other computer in the world would have it. When you try this, your computer does not have internet access. Give two reasons why?

Answers

Answer:

1. internet connection is not enabled on the computer.

2. The DHCP server in the company is not enabled as well.

Explanation:

For a user to access the internet, the computer must have a public IP address that is either assigned to it by a service provider or dynamically from the DHCP server in the computer. In the case of the former, the user just needs to enable the internet connection to obtain the unique IP address.

If the DHCP server or the internet connection is not enabled, the user would not have access to the internet.

Pitch an idea for an app that would help with sustainability (examples could be recycling, food waste or energy). What features would it have, how would one of these features work and how would it positively impact the user of the app

Answers

you could do something like homeless help, it would be able to find homeless ppl if they signed up and get them a partner to help them with there life

Explanation:

What should Anthony use to determine his available study hours for an upcoming project? LOOK AT THE PICTURE

Answers

Answer:

The answer is B i got it right

Explanation:

Answer:

The correct answer is B

Explanation:

What is a sorting algorithm

Answers

Explanation:

In computer science, a sorting. algorithm is an algorithm that puts elements of a list in a certain order. The most frequently used orders are numerical order and lexicographical order. Efficient sorting is important for optimizing the efficiency of other algorithms that require input data to be in sorted lists

What is the fastest way to copy the format from one cell to multiple other cells?
Double-click on the Format Painter.
Single-click on the Format Painter.
Use Copy and Paste commands.
Use Cut and Paste commands.

Answers

use copy and paste commands.. i think! hope this hells

Double clicking on the format pointer is the fastest way to copy the format from one cell to multiple other cells. Thus, the correct option is A.

What is Format pointer?

The format pointer holds a value which represents the memory address of an available data item in the file. If the data item from the file becomes unavailable. For example, because it is in a program which has been canceled then the pointer format is considered to hold a value which is incompatible with the format options.

Use the Format Painter to quickly apply the same formatting, such as the color, font style and size, or border style, to multiple pieces of text or graphics in the data item. With the help of format painter, a person can copy all of the formatting from one object and apply it to another object think of it as copying and pasting for formatting.

Therefore, the correct option is A.

Learn more about Format painter here:

https://brainly.com/question/29563254

#SPJ2

The virus which activated on a specific data and time is called

Answers

Trojans and other computer viruses that activate on certain dates are often called "time bombs".

help me pleaseeee
also what’s the center

Answers

Answer:

a property

Explanation:

h1 is the selector here, and 'center' is the value.

A property !!!!.........

Plz help, will guve brainliest to best answer (if i can)

Answers

Answer:

Online text:1,3,4

not online text:2,5

How can you access your router if your provider is spectrum I've tried calling spectrum, they tried helping me but somehow it hasn't really helped me, is there any other way that I can access my router?

Answers

Answer:

what do you mean by access?

Explanation:

if anything you can try to make an account with spectrum in order to connect your router and see if its connect with your current internet provider. Another thing is most router have an app, check with you comes with one. If it does then this will allow you to change default name and password that your router came with.

See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}

Answers

Answer:

See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.

For instance, for input file:

ABCDEFGHIJKLM

It will output:

ADGJM

Iseek_example.c file contant:

// C program to read nth byte of a file and

// copy it to another file using lseek

#include

#include

#include

#include

void func(char arr[], int n)

{

// Open the file for READ only.

int f_read = open("start.txt", O_RDONLY);

// Open the file for WRITE and READ only.

int f_write = open("end.txt", O_WRONLY);

int count = 0;

while (read(f_read, arr, 1))

{

// to write the 1st byte of the input file in

// the output file

if (count < n)

{

// SEEK_CUR specifies that

// the offset provided is relative to the

// current file position

lseek (f_read, n, SEEK_CUR);

write (f_write, arr, 1);

count = n;

}

// After the nth byte (now taking the alternate

// nth byte)

else

{

count = (2*n);

lseek(f_read, count, SEEK_CUR);

write(f_write, arr, 1);

}

}

close(f_write);

close(f_read);

}

// Driver code

int main()

{

char arr[100];

int n;

n = 5;

// Calling for the function

func(arr, n);

return 0;

}

Explanation:

Graphic software task​

Answers

Answer:

Graphic Designers

ProofHub as Project Management Tool. ProofHub is a versatile project management software for designers. ...

Jira. ...

Kanbanize. ...

Trello as Project Management Software for Graphic Designers. ...

Basecamp as Tool for Project Management. ...

Podio. ...

Asana. ...

Dropbox.

More items...•

The child’s game, War, consists of two players each having a deck of cards. For each play, each person turns over the top card in his or her deck. The higher card wins that round of play and the winner takes both cards. The game continues until one person has all the cards and the other has none. Create a program that simulates a modified game of War.
The computer will play both hands, as PlayerOne and PlayerTwo, and, for each round will generate two random numbers and compare them.
If the first number is higher, PlayerOne’s score is increased by 1 and if the second number is higher, PlayerTwo’s score is increased by 1.
If there is a tie, no score is incremented.
When one "player" reaches a score of 10, that player should be deemed the winner and the game ends.
The range of numbers should be 1-13 to simulate the values of cards in the deck.

Answers

Answer:

In Python

import random

p1 = 0; p2 =0

while(p1 <10 and p2<10):

   p1play = random.randint(1,14)

   p2play = random.randint(1,14)

   print("Player 1 roll: "+str(p1play))

   print("Player 2 roll: "+str(p2play))

   if p1play > p2play:

       p1+=1

       print("Player 1 wins this round")

   elif p1play < p2play:

       p2+=1

       print("Player 2 wins this round")

   print()

print("Player 1: "+str(p1))

print("Player 2: "+str(p2))

if p1 > p2:    print("Player 1 wins")

else:    print("Player 2 wins")

Explanation:

See attachment for complete program where comments were used to explain some lines

This image shows a web designer’s grids for different pages on a website. The uppermost box on each page is the website’s identity. Which important principle of a good website has the designer violated?

Answers

You need to add a picture in order for others to understand what you are asking.

Answer:

consistency

Explanation:

plato

the uppermost box is different sizes and different positions everytime, that violatesone of the principles of design which is consistency.

Assume that the client wants to retrieve the www.cnn home page but has no information about the www.cnn web server IP address. Describe the process of the client obtaining the IP address for the hostname www.cnn under the assumption that it is not cached at the local DNS server and that the local DNS server has not cached an entry for the DNS server. Describe this for the recursive case!.

Answers

Answer:

You could type ipconfig www.cnn in command promt.

Explanation:

What year was "scripting" first invented

Answers

Answer:

Late 1950's

Explanation:

I hope this helps, have a great day :)

define a computer, state its 3 main activities with examples of the functions of each of those activities​

Answers

Answer:

The four main functions of a computer are to:

- take data and instructions from a user

-process the data according to the instructions

- and display or store the processed data.

These functions are also referred as the input function, the procedure function, the output function, and the storage function.

Explanation:

In matlab how would this specific code be written and how could I ask the user to enter a vector of coefficients for the polynomial model. Verify that the entry has an even number of elements (an odd number of elements would mean an even order polynomial). If an invalid vector is entered, prompt the user to re-enter the vector until an acceptable vector is entered. If the user does not enter an acceptable vector after 5 attempts (including the first prompt), display a warning and remove the last element of the last vector entered. (For example, if the last user input is [1 2 3 4 5], the vector becomes [1 2 3 4]).
my code
[1,2,3,4];

Answers

Answer:

Explanation:

that is correct 1234

Write a program that teaches arithmetic to a young child. The program tests addition and subtraction. In level 1, it tests only addition of numbers less than 10 whose sum is less than 10. In level 2, it tests addition of arbitrary one digit numbers (which means that the sum could be more than 10). In level 3, it tests subtractions of one digit numbers with a non-negative difference. Generate random numbers for each of the levels based on its requirements, and get players answers as their response. Verify if the user entered the correct answer. The player will start at level 1, and gets up to two tries per problem. Advance from one level to the next when the player has achieved a score of five points (one point per successful answering the question).

Answers

Answer:

Explanation:

The following program is written in Java and creates three levels with the different set of randomly generated arithmetic problems. As the player goes getting more points they advance every 5 points to the next level.

import java.util.Random;

import java.util.Scanner;

class Main {

   private static Random random = new Random();

   private static Scanner in = new Scanner(System.in);

   static int points = 0;

   public static void main(String[] args) {

       while (true) {

           System.out.println(points);

           if (points < 5) {

               System.out.println("Starting Level 1");

               levelOne();

           } else if (points < 10) {

               System.out.println("Starting Level 2");

               levelTwo();

           } else if (points < 15) {

               System.out.println("Starting Level 3");

               levelThree();

           }

       }

   }

   public static boolean levelOne() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt((10 - numberOne));

       int answer = numberOne + numberTwo;

       int count = 0;

       while (points < 5 && count < 2) {

           System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelOne();

           } else {

               count += 1;

           }

       }

       return false;

   }

   public static boolean levelTwo() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt(10);

       int answer = numberOne + numberTwo;

       int count = 0;

       while (points < 10 && count < 2) {

           System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelTwo();

           } else {

               count += 1;

           }

       }

       return false;

   }

   public static boolean levelThree() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt(10);

       int answer = numberOne - numberTwo;

       int count = 0;

       if (answer <= 0) {

           levelThree();

       }

       while (points < 15 && count < 2) {

           System.out.println("What is " + numberOne + " - " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelThree();

           } else {

               count += 1;

           }

       }

       return false;

   }

}

Use the drop-down menu to complete each statement. First, calculate the time spent doing each activity _____ . Next, multiply each category by ____ . Then, ___ the totals. Last, subtract the total from ____ .

Answers

Answer:1. Every day 2. 7 3. add 4. 168

Explanation:

I got it right on Edge

First, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.

What is the significance of the activity?

The significance of activity may be determined by the fact that it usually enhances your health and lowers the threat of developing several diseases and other abnormal conditions like type 2 diabetes, cancer, and cardiovascular disease.

According to the context of this question, if you are required to calculate the time spent doing each activity in each day. You are required to make a chart that represents all such activities followed by multiplication. Then, you are considerably required to add the totals followed by subtracting the total from the total number of days in a year.

Therefore, first, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.

To learn more about Activities, refer to the link:

https://brainly.com/question/26654050

#SPJ3

What two windows security updates do most organizations always patch?

Answers

Answer:

Explanation:

Patch Tuesday is the name given to the day each month that Microsoft releases security and other patches for their operating systems and other software. Patch Tuesday is always the second Tuesday of each month and more recently is being referred to as Update Tuesday.

Arnie is planning an action shot and wants the camera to move smoothly alongside his running characters. He is working on a tight budget and can’t afford expensive equipment. What alternatives could you suggest?

Mount the camera on a wagon, wheelchair, or vehicle and move it next to the characters.
Rearrange your script so you don’t need to capture the motion in that way.
Try running next to the characters while keeping the camera balanced.
See if you can simulate the running with virtual reality.

Answers

Camera and wagon are answer
Other Questions
Presented below is information for Cullumber Co. for the month of January 2022. Cost of goods sold $201,500 Rent expense $33,900Sales discounts 10,000 Freight-out 6,300Insurance expense 13,400 Sales returns and allowances 17,000 Salaries and wages expense 61,200 Sales revenue 400,000 Income tax expense 5,300 Other comprehensive income (net of $400 tax) 2,000 Prepare a comprehensive income statement. Which senator outwardly condemned McCarthys tactics in his public crusade? a. Alger Hiss c. Margaret Chase Smith b. Whittaker Chambers d. Richard Nixon Please select the best answer from the choices provided A B C D which sentence best expresses the central idea from the text In 1870 who were the three most industrialized nations in the world? How does Holly save herself from the troll . Artemis fowl WILL GIVE BRAINLILESTWho perfected the lightbulb and helped harness electricity? According to Louis C. West, what were 2 problems the Roman Empire faced during its period of decline? Coagulation studies may require:1) Being warmed upon collection2) Being chilled upon collection3) Protection from light4) A discard tube What is the area of this figure? Here are the questions and answers. Please help! Sea p(x) = 2x + 4, calcular p(5) + p(2 Matching Definitions with Information Releases Made by Public Companies Following are the titles of various information releases. Match each definition with the related release by entering the appropriate letter in the space provided. Definitions Information Release Report of special events (e.g., auditor changes, mergers) (1) Form 10-Q filed by public companies with the SEC. Brief unaudited report for quarter normally containing (2) Quarterly report summary income statement and balance sheet. Quarterly report filed by public companies with the SEC (3) Press releasethat contains additional unaudited financial information. Written public news announcement that is normally (4) Annual reportdistributed to major news services. Annual report filed by public companies with the SEC (5) Form 10-Kthat contains additional detailed financial information. Report containing the four basic financial statements for (6) Form 8-Kthe year, related notes, and often statements by management and auditors. A single die is rolled one time What is the probability of rolling an even number or a 5? Find the length of the missing side of the right triangle.24 ft7 ftO 25 ftO 31 ftO 22.96 ftO 625 ft x + 2 2solve and show work if the circumference of a circle is 52 cm, what is the radius? round to the nearest tenth. PLESE HELP I DONT HAVE THAT MUCH TIME :( I am writing my conclusion paragraph for my research paper about child abuse and neglect. This is my research question, "What are the signs or symptoms of child abuse and neglect?" I need to revisit the hook or write a broad statement about the topic that leaves the reader thinking. This is my hook, Hook: "Have you ever wondered why some children are always in rough shape? Maybe they always have a bruise, or apologize without even doing something wrong? Maybe they even keep to themselves entirely, and are completely anti-social? There is always a possibility that the answer could be child abuse."If you have any questions let me know, thank you :) What is the term that is used to describe lung damage from vaping PLEASE HELP! I GIVE BRAINLIEST!! What are the correct values for the missing boxes in the ratio table in number 4 above? A. 5 pointsB. 2 clients and 12 hoursC. 1 client and 24 hoursD. -5 clients and 24 hours6 clients and 18 hours helpppppppppppppp!!!!!!!!!!!!!how did chlorine atom attain saturation in potassium chloride and oxygen dichloride