What is a single physical processor? plz help​

Answers

Answer 1

Answer:

A physical processor which is also referred to as a CPU, is a chip that is visible on a computer's circuit board.

Explanation:


Related Questions

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

Answer:

any program designed to do harm.

Explanation:

Malware is a program that was created by someone with malicious intent. Malware can target your windows system files and damage windows(or what ever os you use). Malware can corrupt files and even lock you out of your computer.

write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps

Considering what you know about dominant and recessive genes, what are the possible genotypes for brown eyed babies? What are the possible genotypes for blue eyed babies? Explain how you came to this response making sure to discuss dominant and recessive genes.

Answers

Answer:

B = Brown, b = blue

BB & BB = 100% Brown, 0% Blue

BB & Bb = 100% Brown, 0% Blue

Bb & Bb = 75% Brown, 25% Blue

Bb & bb = 50% Brown, 50% Blue

bb & bb = 0% Brown, 100% Blue

Explanation:

Reference the Punnett square. The brown gene when mixed with a blue gene  in one of the four squares is always dominant.

Computers work on the garbage-in, garbage-out concept. Comment

Answers

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output.

Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage." For example, if a program asks for an integer and you enter a string, you may get an unexpected result. Similarly, if you try to open a binary file in a text editor, it may display unreadable content.

GIGO is a universal computer science concept, but it only applies to programs that process invalid data. Good programming practice dictates that functions should check for valid input before processing it. A well-written program will avoid producing garbage by not accepting it in the first place. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

NOTE: Because the related terms FIFO and LIFO are pronounced with a long "i," GIGO is typically pronounced "guy-go" (not gih-go). This also helps avoid confusion with the prefix "giga," which is pronounced with a soft "i."

What happens when you drag a file from the Documents folder on the hard drive to the Pictures folder on the hard drive?

Answers

Answer:

The file changes its location within your hard drive while the file itself remains unchanged

Explanation:

The file's location will change from C:\Users\username\Documents to

C:\Users\username\Pictures

Why should a user preview the document before printing?​

Answers

Answer:

Print preview is a useful function to users as it helps them to see how the final printed material will appear. It also gives the user the opportunity to check or adjust the layout or resolve any issues before printing the material to achieve the intended final form.

how are the computer classified into different types​

Answers

Answer:

Computers differ based on their data processing abilities. They are classified according to purpose, data handling and functionality. ... According to data handling, computers are analog, digital or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

1. .……............. can be considered as raw data.

(a) Sithum’s G.C.E. (O/L) examination results

(b) Z-Score of G.C.E. (O/L) examination results

(c) The average marks of students of G.C.E. (O/L) examination

(d) The top ten total marks of students of G.C.E. (O/L) examination

Answers

Answer:

(a) Sithum's G.C.E. (O/L) examination results

Explanation:

Raw data which is also known as primary data, are the data collected when performing a research, investigation or study, which are obtained through a survey, experiment, or observation and from which correlations and distributions can be calculated, only when the data is complete

Therefore, raw data is unprocessed data, and the option which can be considered as raw data is the option which is not processed, which is Sithum's G.C.E. (O/L) examination results.

Hey, um guys help me as my laptop will not turn off properly as whenever i turn it off, it will turn back on by me pressing a key please help!!! URGENT!!!

Answers

Answer:

hold the power key until you restart.

Explanation:

Your disaster recovery plan calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you choose a method that uses the least amount of backup media, but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the disaster recovery plan

Answers

Answer:

Perform a full backup once per week and a differential backup the other days of the week.

Design a sequential circuit with two flip-flops A and B and one input X. When X = 0, the state of the circuit remains the same. When X = 1, the circuit goes through the state transitions from 00 to 10 to 01 to 11, back to 00, and then repeats. Show the state transition by 7-segment display decoder using a. D-Flip Flop-Section B b. T-Flip Flop-Section A c. JK-Flip Flop-Section B d. RS-Flip Flop-Section A

Answers

Answer:

see your answer in picture with detail

please mark me brainlist

Explanation:

Which of the following statements is true about scalability? Choose 3 options.

Horizontal scaling has fewer limits than vertical scaling.

Scalability refers to the ability of hardware components to increase their capacity.

Scalability should be considered very early in the project.

The cloud offers services to automatically scale your system and balance the workload between components.

An example of vertical scaling is adding a new server to the network.

Answers

Answer:

Horizontal scaling has fewer limits than vertical scaling.

The cloud offers services to automatically scale your system and balance the workload between components.

Scalability should be considered very early in the project.

Explanation:

Hope this helps :) If not, please let me know what answers are wrong

The statements that is true about scalability are:

The clouds provide resources to scale the system and balance the workload between components

Scalability should be considered at the beginning of the project.

Horizontal scaling has fewer limits than vertical scaling.

Horizontal scaling is a type of scaling by adding more machines to your po of resources.

It is also called adding more power.

The difference between scaling up and scaling out is that horizontal scaling simply adds more machine resources to your existing machine infrastructure.

Vertical scaling is simply known to adds power to your existing machine infrastructure by increasing power from CPU or RAM to existing machines.

Conclusively, Scalability part of a system that handle a growing amount of work by adding resources to the system.

Learn more from

https://brainly.com/question/17661222

How do you send a file to someone in an email? (Choose all that apply). A. Select Send File and choose the file you need. B. Select the paperclip icon and choose the file you need. C. Open the file and then select Send in your email. D. Select Attach and choose the file you need.

Answers

Answer:

C. Open the file and then select Send in your email.

D. Select Attach and choose the file you need.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.

On a related note, some of the methods used for sending a file to someone in an email are;

I. Open the file and then select Send in your email.

II. Select Attach and choose the file you need.

There are many best practices for digital recordings. Select the three best practices from the list below. select the best microphone for your situation use a variety of surroundings and settings be conscious of your lighting wear headphones while listening to your recording only film the footage you need

Answers

Explanation:

1. Wear your headphones while listening to your recording: It is important to make sure there are no echoes or background noises in the room.

2. Pay attention to your surroundings: It is important to eliminate any unwanted motions or unwanted noises associates with motion.

3. Use a tripod or a table microphone: It is important not to be distracted by background noise or confuse it with background noise from your recording.

You install Windows 10 on a new computer. You update the video card driver and restart the computer. When you start the computer, the screen flickers and then goes blank. You restart the computer and receive the same result. You need to configure the video card driver. What should you do first

Answers

First, you need to cut off power to the PSUHit the switch on the back of the PC to turn off supply to the PSU. Extract the side panel (usually held on by two screws on the rear)If you do not already have a GPU installed, skip to Step 7.

3. Remove the screws holding the GPU in on the rear bracket. ...

4. Unlock the PCI-e slot clip.

5. Remove the GPU by lightly pulling on the card.

6. Hover the GPU over PCI-e slot.

7. Push down on the GPU to slide the connector into the slot.

8. Ensure the secure lock clicks into place.

9. Screw the rear bracket down to secure the card to the chassis.

10. Connect any required PSU cables.

11. Reattach the side panel,

Now, all you need to do is to plug in the display connectors on the rear of the case, whether they're DisplayPort, HDMI, DVI, or VGA. After that, hit the PSU power switch and boot up Windows. If the PC does not turn on or no signals get sent to the monitor, we'll need to double-check that all cables are connected correctly (both inside and on the rear of the PC), and the GPU is seated properly in the PCIe slot.

[10 points] Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of digits.

Answers

Answer:

I am going to write the program using BASIC PROGRAMMING

Explanation:

10 PROGRAM TO CALCULATE SUM OF DIGITS

20 INPUT B,H,T,G

30 LET Y = B+H+T+G

40 PRINT Y

DO THIS ON BASIC PROGRAMMING AND YOU HAVE YOUR PROGRAM

can you fart and burp at the same time?

Answers

Answer:

Yes you can

Explanation:

Although farting and burping at the same time is a very rare phenomenon, it’s very possible. When this happens at the same time it is usually called a Furp.

This occurrence usually happens when there’s a lot of intake of foods which have a large percentage of gas . These gases often need to be expelled through processes such as burping and farting.

Which of the following are characteristics of centralized version control systems? Select 3 options.

A full copy of all project files is stored on each developer's computer.

Changes to the project are stored in a log file on each developer’s computer.

It allows many developers to work on the same project from anywhere at the same time.

Project files are maintained in a central repository.

The process may require file locking, depending on file type.

Answers

Answer:

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Explanation:

The two main types of version control system are the centralized version control system and distributed control system

The centralized version control system is a control system whereby all programmers work on and make their individual changes to a single single copy of the project stored and maintained in a central repository, such as a server

In order to solve the problem of several developers working on each others work simultaneously, a centralized version control system makes use of the lock-modify-unlock model

The three options are therefore;

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Answer:c d e

Explanation:

What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations

Answers

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

You manage several Windows systems. Desktop users access an in-house application that is hosted on your intranet web server. When a user clicks a specific option in the application, they receive an error message that the pop-up was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do

Answers

Answer:

Add the URL of the web site to the local intranet zone.

Explanation:

An intranet can be defined as a private computer network established within an organization and is typically used for securely sharing organizational informations, computing resources, operational system, and collaboration tools between employees through an internet protocol (IP). Thus, it's mainly a private network that is only accessible to authorized users or employees within an organization.

An intranet web server is a type of server that manages the request for files that are stored on it and are generally not exposed to the general public.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address. Also, the uniform resource locator (URL) is converted to an internet protocol (IP) address, which then points it to a web server.

In this scenario, when a desktop user clicks a specific option in the in-house application that is hosted on an intranet web server, they receive an error message that the pop-up was blocked.

Hence, it's necessary that the security settings of the web server is configured so that users are able to see the popup without compromising overall security. Thus, you should manually add the uniform resource locator (URL) of that particular website to the local intranet zone.

The local intranet zone is a security feature that is typically used for setting web content permissions on a local area network (LAN). Thus, this policy setting or security feature is used for adding websites that aren't residing on a computer or an intranet web server.

what is a computer in daily life​

Answers

Answer:

The use of computers on a regular basis in our life is very important. Technically in daily life computer is used to convert raw facts and data into meaningful information and knowledge. Computer science is explored and challenged by humans daily. The computer is like an electronic magical device for our life.

Explanation:

What type of operating system is Linux? An outsourced operating system An open source operating system A closed source operating system A variable source operating system

Answers

Answer:

Linux is a free, open source operating system.

Explanation:

Answer:

Linux is an open source operating system (OS). An operating system is the software that directly manages a system's hardware and resources, like CPU, memory, and storage.

Write the contribution of Charles Babbage in the history of computer.​

Answers

Answer:

The main contributions of Charles Babbage are;

1 ) He invented difference engine and analytical engine.

2) He gave basic concept of of mathematics in his analytical engine.

3) He also keep the concept of using binary digits in his machine.

4) He had led to the the foundation of modern computer in his analytical engine including the concept of of input, processing and output

Hope it helps.... :)

who is the father of computer​

Answers

Answer:

Charles babbage is the father of computer

Explanation:

Charles Babbage is a father of computer

A user informs you that he or she never deletes any files he or she creates. How might this affect the operating system? It will cause the operating system to crash. It will cause the operating system to upgrade. It will cause the operating system to run faster. It will cause the operating system to run slower.

Answers

Answer:

Depending on the amount of files there are, the operating system will run slower because these files take up space on the hard drive, slowing it down.

Explanation:

cises t Answer Questions 1. What is Open source Operating System? Write the advantages and disadvantages of Open source Operating System.​

Answers

Answer:

Question 1. Open source operating system is an operating system that allow the public to view and edit the source codes on which the operating system is developed, and any user can have access to and edit the source code

Advantages of Open Source Operating System

a) Open-source operating system are usually free, or very low price

b) The open source operating system are constantly being evaluated globally by skilled users and developers that can get bugs fixed once they are detected

c) Open-source operating system can be customized

Disadvantages of Open Source Operating System

a) The free access to the source code increases the vulnerability of open-source operating system to attacks

b) Users are expected to have a certain level of technical proficiency to be able to use an open-source operating system

c) The open-source operating system comes without a customer support service

Explanation:

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

After a chart has been inserted and formatted, is it possible to change the data range it refers to or to add new rows of data?

No, additional data cannot be included in a chart once it has been created; the user should delete the chart and create a new chart.
Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.
Yes, click the chart, select the additional rows or columns of data to add, and press Enter on the keyboard.
Yes, double-click the chart and select Properties from the list; in the Properties box, insert the new data range to include in the chart.

Answers

Answer: Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.

Explanation:

Excel allows one to be able to update the data in a graph because the designers knew that information needs to be updated sometimes.

This is why there is an option to use the Data button in the Data group which is under the Design tab to increase or decrease the data range that is to be used in the chart which means that a new row of data could even be added.

To call a member function, you code a. the name of the object in parentheses, followed by the name of the function b. the name of the object, the dot operator, and the name of the function c. the name of the object, followed by the scope resolution operator and the name of the function d. the name of the object, followed by the name of the function in parentheses

Answers

Answer:

using a pointer to member function to call function

If you were creating your own website, what would you include to make sure your website was reliable and
valid?

Answers

Answer:

I would make sure to include all the sources i used? IT depends on what the website is about.

Explanation:

Hey there!

These are the best things to do to your website if you want to make sure it's reliable and valid:

Include research Do NOT include any biased opinions

Hope this helps!

Have a great day! :)

Other Questions
Del Monty will receive the following payments at the end of the next three years: $8,000, $11,000, and $13,000. Then from the end of the 4th year through the end of the 10th year, he will receive an annuity of $14,000 per year. At a discount rate of 12 percent, what is the present value of all three future benefits In the garden pea, yellow cotyledon color is dominant to green, and inflated pod shape is dominant to the constricted form. When both of these traits were considered jointly in self-fertilized dihybrids, the progeny appeared in the following numbers : 193 green, inflated : 184 yellow, constricted : 556 yellow, inflated : 61 green, constricted. Test the data for independent assortment ***CAN SOMEONE HELP ME PLEASE!!***The polygon in each pair are similar. Find the missing side length What's is biosynthesis Give reason.b} String roller is an example of wheel and axel .Why? Which dimensions cannot create atriangle? three angles measuring 25 65, and 90 three angles measuring 50, 30, and 100 three sides measuring 5 in., 12 in., and 13 in. three sides measuring 4 ft, 8 ft, and 14 ft The standard entropy change of a reaction has a positive value. This reaction results in: Select the correct answer below: a decrease in entropy. an increase in entropy. no entropy change. neither an entropy increase nor decrease. please answer this question! In the story, Nuttel is given letters of introduction by his sister. What's the purpose of these letters?A. to attend a particular social eventB. to apply for a jobc. to ask for a hand in marriageD. to make social calls 20 5 = I need help what type of variation is this relationship Which expression(s) represent(s) the perimeter of the following figure? Select all that apply. (answers are in units) 1. In 2-3 sentences, describe your response to this event and what, if anything, you think Washington State government should do about the Hanford Nuclear Site? (Right answer only please) :) when filling out the order form, please _ your address clearly to prevent delays.A. FixB. WriteC. SendD. Direct how to find volume of this prism? Given the following data for Scurry Company, what is the cost of goods sold? Beginning inventory of finished goods $100,000 Cost of goods manufactured 700,000 Ending inventory of finished goods 200,000 Beginning work-in-process inventory 300,000 Ending work-in-process inventory 50,000 Select one: a. $600,000 b. $950,000 c. $500,000 d. $800,000 Plexiglas, polymethylmethacrylate (PMMA), is often used as display windows and cases in art galleries and museums. If its flame imparts 32 kW/m^2 to the surface when it burns estimate the energy release rate of a 3 m^2 square sheet (one side). Assume its vaporization temperature is 350C. Calculate with units, provide work. A lightning bolt has a current of 56,000 A and lasts for 80 x 10-6 seconds (80 s). How much charge (in Coulombs) has flowed in this bolt? PLZ HELP ME WITH MY WORK Type 7.2e-4 as a floating-point literal but not using scientific notation, with a single digit before and five digits after the decimal point.