The doubling of the power of microprocessor technology while the costs of its production decreases by half is called ______ Law.

Answers

Answer 1

Answer:

The doubling of the power of microprocessor technology while the costs of its production decreases by half is called Moore's Law.

Explanation:

The Moore's Law was a law derived from a projection on historical trend of the number of transistors in integrated circuits rather than a statement based on laws of Physics. This law stated originally that the number of transistors in an integrated circuit doubles whereas production costs halves due to gain in manufacturing and design experiences every two years. This empirical law was formulated in 1.965.

Microprocessors are IC-based.

The complete answer is: The doubling of the power of microprocessor technology while the costs of its production decreases by half is called Moore's Law.


Related Questions

A construct that enables you to create custom types by grouping together variables of other types is called a what

Answers

Answer:

A class

Explanation:

A class is a construct that enables you to create your own custom types by grouping together variables of other types, methods and events. You can map classes to an existing database or use them to generate a database. In this tutorial, you'll create the data models by writing data model classes.

which shooting games is good for low end PC. CSGO or Valorant?​

Answers

the best choice would be csgo

We use loops to: Process Numeric Data Ask users to enter information Repeat blocks of code Ask True/False questions

Answers

Answer:

Repeat blocks of code.

Explanation:

EXAMPLE JAVASCRIPT LOOP CODE

_________________________________________________________

INPUT:

while(true){//Check If bool True=True

console.log("Hello World!")

}

_________________________________________________________

OUTPUT:

Hello World!

Hello World!

Hello World!

Hello World!

Hello World!

[tex]\cdots[/tex]

Hello World!

Hello World!

B2B partners often connect to each other on the Internet through special __________ designed to facilitate information exchanges and transactions. search engines web masters web portals web routes gatekeepers

Answers

Answer:

web portals

Explanation:

B2B (business-to-business) is a marketing strategy that deals with meeting the needs of other businesses, by selling products or services to the organizations for resale to other consumers, used in production of goods or for the operation of an organisation.

B2B (business-to-business) model focuses on facilitating sales transactions between businesses.

Under the B2B, the producer sells its products directly to other businesses such as wholesalers or retailers and not the end consumers.

B2B partners often connect to each other on the Internet through special web portals that are designed to facilitate exchange of information and simplified business transactions.

Additionally, a popular application of the seller-side marketplace model, which is a major business-to-business (B2B) e-commerce model, is e-procurement of goods through the use of web portals over the internet and as such eliminating the option of physical buying or procurement.

Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File

Answers

Answer:

Explanation:

1.Save and Save As

The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name

2.Blank Document and Template

Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template

3. Existing File and Recently Open File

Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist

State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translates the machine language into programming language. Backup is a process of shrinking the files on a disk. VisiCalc was the first computer spreadsheet program. An interpreter translates the whole program into an equivalent code in one go.​

Answers

Answer:

2. translates program written in any programming language into Machine language

last ko . false

Explanation:

aru aaunna

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?

Answers

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

what is the term used to describe the situation when a derieved class provides a function already provided in the bae class

Answers

Answer:

The right approach is "Overriding".

Explanation:

The overriding function seems to be a programming application that enables a classroom as well as children to successfully implement some technique that's been given by another one of their parents or super classes.The overriding method must be named, signed, and parameter-like inside your parent process throughout the child one.

Thus the above is the correct answer.

Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?

Answers

Answer:

Webbed storyboard technique

Explanation:

There are several storyboard techniques; however, the best for a website is the webbed storyboard technique.

Coined from the word "web", this technique does not only help in linking pages within the website where a page can be access from other pages, it also links pages of the website to external pages.

An illustration is as follows:

From the homepage of a website, one can access the contact page, the about page, etc.

Each of the listed pages also have link back to the homepage and to every other pages.

¿Si tengo un disco de 1Tb, y en el tengo almacenado lo siguiente:
a) 300 videos de 126GB en total
b) 1376 archivos de office que cada uno pesa 117kb.
c) 3000 mp3 de 3.8mb cada uno.
d) 4Gb ocupados en el sistema operativo.
¿Cuánto espacio me sobre en el disco duro?

Answers

Answer:

Espacio a la izquierda = 858,8439008 Gb

Explanation:

Dados los siguientes datos;

Tamaño del disco duro = 1 Tb

Vídeos = 126 Gb

Archivos de Office = 1376 * 117 Kb = 160992 Kb

Mp3 = 3000 * 3.8 mb = 11400 Mb

Sistema operativo (OS) = 4 Gb

Conversión:

En primer lugar, convertiríamos el tamaño del archivo en kilobytes a megabytes.

1000 Kb = 1 Mb

160992 Kb = 160992/1000 = 160.992 Mb

Memoria total (Mb) = 11400 + 160,992

Memoria total (Mb) = 11560.992 Mb

A continuación, convertiríamos el tamaño del archivo en megabytes a gigabytes;

1000 Mb = 1 Gb

11560.992 Mb = 11560.992/1000 = 11.560992 Gb

Por último, sumaríamos todos los tamaños de archivo en gigabytes;

Espacio total (memoria) utilizado = 126 + 11.560992 + 4

Espacio total (memoria) utilizado = 141,560992 Gb

Conversión:

1000 Gb = 1 Tb

Espacio restante = tamaño del disco duro - memoria total utilizada

Espacio a la izquierda = 1000 - 141.560992

Espacio a la izquierda = 858,8439008 Gb

Nota:

Kb significa kilobyte. Mb significa megabyte. Gb significa gigabyte. Tb significa terabyte.

A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?

Answers

Answer:

Closed

Explanation:

When a connection has been terminated and no communication is possible between the communicating network devices, the Transmission Control Protocol (TCP) socket would be closed.

A number of computers have been reported to be getting incorrect IP addresses. After doing some investigation, an unauthorized DHCP server has been determined to be the cause. Which step in the troubleshooting process should be performed next

Answers

Answer:

Establish a plan of action to find the DHCP server.

Explanation:

The troubleshooting process can be defined as the sequential steps that are to be taken while trying to proffer a solution to a problem, usually on computer systems.

The seven (7) steps of the troubleshooting process in ascending order are;

1. Identify the problem.

2. Establishing a theory of probable cause of the problem.

3. Test the established theory to determine cause.

4. You should establish a plan of action to resolve the problem while identifying its potential effects.

5. Implement a solution.

6. Verify full system functionality.

7. Document findings, actions and outcomes.

In this scenario, the step in the troubleshooting process that should be performed next is establishing a plan of action to resolve the problem by finding the unauthorized dynamic host control protocol (DHCP) server issuing the incorrect internet protocol (IP) addresses.

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

outline the steps involved in changing the colour of a theme ​

Answers

Answer:

Right click on the desktop and click on personalize option and then click on window color. After that window color and appearance window appears. select a color scheme you want. Go to Appearance and personalization, click on theme and select any theme from the list and click on ok.

there are....... section in
cpu

Answers

Explanation:

The CPU is made up of three main components, the control unit , the immediate access store and the arithmetic and logic unit .

Draw a flowchart to find greater number among three number​

Answers

Answer:

See attachment for flowchart

Explanation:

First, we get input for the three numbers

The flowchart then checks if the first number is greater than the other two

If yes, the first is assigned the largest

If otherwise, the second number is tested

If it is greater than the other two, then the second is assigned the largest

If otherwise, the third is assigned the largest

Lastly, the largest is printed before the flowchart ends

Discuss if you think technology, mobile apps, and/or social networks make us lazy or not. Justify your answer.
Identify ways that you’ve seen social media affect people in the workplace or in society (whether positively or negatively).
Analyze technology’s impact (and in particular, consider social media and mobile apps) on your own life.

Answers

Answer:

Yes, I do you can't just go out and work, play, or anything outside and people just want to stay inside on electronics like phones, tv, game systems.

Explanation:

   In truth, technology has made a lot of difference in our society, but it has also transformed humans into lazy-bones. These days, people don't need to run errands anymore; they push a button on their phone (another product of tech) and have most of the human's first world problems solved

a passcode is created using 4 digits. how many passcodes can be created where the code has to be 5000 or greater with no digit allowed to repeat

Answers

Answer:

5000 passcodes

Explanation:

5x10x10x10 = 5000

c724 wgu True or false. A storage device consists of all the components that work together to process data into useful information

Answers

Answer:

False

Explanation:

A output device consists of all the components that work together to process data into useful information

You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office.Srv1 stores several shared folders that you use, including the Data share. You use Offline Files in the branch office to make the files on the server are available when the WAN link is down.How can you prevent all files in the Data share from being cached while making sure files in other shared folders are still available?A. On Srv1, edit the Local Security Policy.B. On Comp1, edit the Offline Files settings in the Sync Center.C. On Srv1, edit the properties for the Datafolder.D. On Srv1, edit the Offline Files settings in the Sync Center.

Answers

Answer:

C. On Srv1, edit the properties for the Data folder

Explanation:

Using the caching feature of Offline Folder gives users access to shared folders through the maintenance of a local copy which allows users to continue working with the resources in the shared folder in the event the server hosting the folder cannot be reached, which leads to increased  productivity. However, when a shared folder is the storage location of sensitive data to which there is restricted access, it may be required to prevent the folder from being cached

The caching option property for the shared folder can be set from within the Offline Settings, to configure the availability of the folder when the server WAN link is down

Choose all that apply: You are servicing a Dell Inspiron 22 3265/3263 AIO Desktop and determine that the LCD panel is faulty. What troubleshooting steps will you follow before replacing the LCD Assembly

Answers

Explanation:

1.) Run ePSA, but press ESC to stop testing and regain control of the cursor. Double tap on the screen and see if the cursor moves to your pressed location. That will determine if the hardware is needed to be replaced or it is a software problem

2.) If the system boots into windows, check the device manager for the USB Input device which has a white circle and a down arrow, right click and enable it to test its functionality.

The troubleshooting steps that the user will need to follow before the LCD Assembly is replaced goes thus:

One will have to run the ePSA.The cursor will have to be regained by press esc in order to stop the testing.Then one will have to double tap the screen in order to check whether the cursor had been moved to the pressed location.The above is necessary in order to know if there will be a replacement of the hardware or whether it is a software problem Then if the system boots into windows, one will have to check the device manager in order to find the USB Input device which will then be right clicked to test its functionality.

In conclusion, the above method will be used for the troubleshooting.

Read related link on:

https://brainly.com/question/18275236

1) a program that is designed to perform only one task.

Answers

Answer:

special purpose application software

Explanation:

it is a type of software created to execute one specific task.for example a camera application on your phone wul only allow you to take and share pictures.

Other example of special purpose application are web browsers,calculators,media playors,calendar programs e.t.c.

When a primitive type variable is passed as an argument to a method, what is passed into the receiving method's parameter variable

Answers

Answer:

The value of the primitive type variable is passed into the receiving method

Explanation:

Examples of primitive data types are integers, floats, real, double, character, byte, etc.

When any of these data types variables are passed to a method, the method which receives the variables receives the value of the variable being passed.

Take, for instance; the following code segment:

int doubleNum(int num){ ..... }

int main(){ ... num = 2; doubleNum(num);}

The above function doubleNum will receive the value of num (which is 2).

What is the Role of an algorithm?

Answers

Answer:

Informally, an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output.

pls Mark me as brainliest trust me

why are computer important these days?write in short


Answers

Computer has become very important nowadays because it is very much accurate, fast and can accomplish many tasks easily. Otherwise to complete those tasks manually much more time is required. It can do very big calculations in just a fraction of a second. Moreover it can store huge amount of data in it.

In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.

Answers

Answer:

case-based.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.

In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.

Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called: cumulative sequence check batch sequence check suspense file of missing numbers computer agreement of batch totals

Answers

Answer:

batch sequence check.

Explanation:

A batch sequence check can be defined as a strategic and systematic control plan which typically involves the process of inputting a range of numbers comprising a batch and then inputting each serially numbered document.

The steps for checking an event data within a batch using a batch sequence check include the following;

I. You'll enter a range of serial numbers of the document in a batch.

II. You'll enter each serially pre-numbered document one after the other.

III. The input documents are sorted by a computer into a serial (numerical) order, match the sequence number range against the input documents, and then reports any part of the document that is missing, a duplicate and out of range.

A Linux systems admin reported a suspicious .py file that ran on a daily schedule after business hours. The file includes shellcode that would automate Application Programming Interface (API) calls to a web application to get information. What type of script is executing this shellcode

Answers

Answer: Python script

Explanation:

Based on the information given in the question, the type of script that is executing this shellcode is the Python script.

The Python script is a file that contains codes that are written in Python. In such case, the file which contains the python script typically has an extension

which is ".py"' or ".pyw" when it's run on windows

Therefore, based on the information given, the answer is Python script.

The type of script used in executing the shellcode that would automate Application Programming Interface (API) calls to a web application to get information is called; Python Script.

The type of script required to execute the given shellcode is called a python script. This is because the Python script is simply defined as a file that contains a code which is written in Python.

Now, this file which contains the python script will have the extension ‘.py’. However, if it is being run on a windows machine, it could also be the extension ‘.pyw’.

Finally, to run a python script, all we need to do is to get a python interpreter that we will download and install.

Read more about python at; https://brainly.com/question/16397886

HELPPPPP !!!!!!!!!!!

Answers

Answer:

Computers are developed along two separate engineering paths, producing two different types of computers.

An analog computer operates on continuosly varying data.

A digital computer operates on descrete data.

Data sorting refers to the arrangement of the data records in the ascending or descending order on the basis of numeric of alphabetic fields.

Answer:

hope this will help you friend.

como se llama el arte de pintar en las cuevas sus actividades de caceria

Answers

shsibdhebduduebsisodbduei


Other Questions
Help ASAP only right answers only no spam dont answer if you dont know Someone please help me Read the following sentence from the article: The most remarkable achievement of mission control was quickly developing procedures for powering up the CM after its long, cold sleep. This statement contains:personification.a simile.foreshadowing. The square root of the variance is called the: standard deviation beta covariance coefficient of variation I need help solving this problem . what principle did Martin Luther King Jr and others learn from the political strategy of Gandhi? what are all the factors 24? please help lol heeeeeeeeeeeeelp meee (b) If A(t) is the amount of the investment at time t for the case of continuous compounding, write a differential equation satisfied by A(t). What is a bank customer's share of the profits made on loans? O A. Exchange rates B. Principal payments O C. Stock dividends O D. Savings account interest what is computer engineering The area of the Sudetenland can bestbe described in which of the followingways?A. It was an area owned and operated by the SovietUnion.B. It was an area that was its own independent nation.C. It was an area Italy owned, but the French lived in.D. It was an area Germans lived in, but was owned byCzechoslovakia supply the predicate following sentence question nepal The importance of the Truman doctrine (1947) for the development of the Cold War (8 marks) Ardi and Lei are both travelling by train. Ardi's train travels 70 km in 35 minutes. Lei's train travels 585 km. It leaves at 9:05 and arrives at 13:35. Work out the difference, in km/h, between the average speed of their trains. Please help me I keep on getting the third box wrong In a geometric sequence, the term a(n+1) can be smaller than the term a(n-) Aqueous hydrochloric acid will react with solid sodium hydroxide to produce aqueous sodium chloride and liquid water . Suppose 35. g of hydrochloric acid is mixed with 73.0 g of sodium hydroxide. Calculate the minimum mass of hydrochloric acid that could be left over by the chemical reaction. Round your answer to significant digits. SOMEONE PLEASE HELPPPPPPPPPP Estimate 19.625-6.77 by first rounding each number to the nearest tenth.