Answer:
Using Frame Rate
Explanation:
Most benchmark tests measure the performance of a graphic card by using "Frame Rate"
This is because using Frame Rate assesses and then measures the number of images a GPU (graphic processing unit) can render and at the same time the number of images that are being shown on a monitor or screen per second.
Hence, in this case, the correct answer is "Frame Rate"
See the picture and answer the coding question
Answer:
Actually I don't know computer so I can't help you sorry bro
a farmer cultivates 1/4 of his farm with ground nuts and 2/5 of it with maize what is the total landnarea that is cultivated
Answer:
13/20
egeringioerngierngineriogneirognoernogenroiernonoirenogneogneiong
function _one(array)
Create a JavaScript function that meets the following requirements:
•
•
•
•
Please give your function a descriptive name
o ( _one is not acceptable, and is only displayed here for illustration purposes)
Receives an array of integers as an argument
The function removes all duplicates (if they exist) from the array and returns it to the caller.
Assume the input array parameter will have at least one element in it.
Examples :
_one([33])
➔ [33]
_one([33, 33, 1, 4])
➔ [1, 4]
_one([33, 33, 1, 4, 1]) ➔ [4]
Answer:
function removeRepeaters(list){
var goodList = [], badList = {}, used = {}, n;
// ensure that the argument is indeed an array
if(!Array.isArray(list)){
throw "removeRepeaters: Expecting one argument of type Array";
}
// loop through the array and take note of any duplicates
for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;
// now loop through again, and assemble a list of non-duplicates
for(n in list) if(badList[list[n]] == undefined) goodList[] = list[n];
return goodList;
}
Explanation:
I assume you're familiar with trinary operators, but just in case, that's what's happening in this first for loop:
for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;
this is the same as saying:
for(n in list){
if(used[list[n]] == true){
badList[list[n]] = true;
} else {
used[list[n]] = true;
}
}
This loop flags all of the values in the list that are duplicated. Note that both "badList" and "used" are declared as objects instead of arrays. This allows us to compare keys in them with an == operator, even if they're not defined, making it a convenient way to flag things.
Note that I haven't tested it, so I may have overlooked something. I suggest testing it before handing it in.
What is meant by the term text?
A. Printed information only
B. Printed, visual, and audio media
C. Any words conveyed by media
D. Content found only in books and mag
The term text means content found only in books and mag. Thus, option D is correct.
What is a text?
It is a set of statements that allows a coherent and orderly message to be given, either in writing or through the word of a written or printed work. In this sense, it is a structure made up of signs and a certain writing that gives space to a unit with meaning.
A video is a recording of a motion, or television program for playing through a television. A camcorder is a device or gadget that is used to record a video. audio is the sounds that we hear and mix media is a tool used to edit the video.
Digital camcorders are known to have a better resolution. The recorded video in this type of camcorder can be reproduced, unlike using an analog which losing image or audio quality can happen when making a copy. Despite the differences between digital and analog camcorders, both are portable, and are used for capturing and recording videos.
Therefore, The term text means content found only in books and mag. Thus, option D is correct.
Learn more about text on:
https://brainly.com/question/30018749
#SPJ5
During what stage of problem solving is information gathered in order to see if the plan produced the intended outcome?
A. implement the solution
B. Define the problem
C. Identify solutions
D. evaluate results
Identify solutions is to see if the plan produced the intended outcome.
Hence, option C is correct answer.
What is problem solving?Diagnose the circumstance to keep your attention on the issue and not merely its symptoms. Use cause-and-effect diagrams to establish and examine root causes, and flowcharts to show the anticipated steps of a process while solving problems.
Key problem-solving steps are explained in the sections that follow. These actions encourage the participation of interested parties, the use of factual information, the comparison of expectations with reality, and the concentration on a problem's underlying causes. You ought to start by:
reviewing and capturing the functioning of current processes (i.e., who does what, with what information, using what tools, communicating with what organisations and individuals, in what time frame, using what format).
assessing the potential effects of new resources and updated regulations on the creation of your "what should be"
Read more about problem solving:
https://brainly.com/question/23945932
#SPJ1
PLEASE HELP WILL MARK BRAINLEST!!
What are some inadvertent effects of technology?
Answer:
Industrialization increased our standard of living, but has led to much pollution and arguably, even some social ills. The benefits brought by the internet are too many to mention, yet viral misinformation, vast erosion of privacy, and the diminishing patience of society as a whole were all unintended consequences.
Answer:
It has also increased idle time of workers
It is also true that we are now spending more time visiting social networking sites, rather than our friends and family
Explanation:
10. List three adaptations of wind-pollinated plants to promote pollination.
Answer:
No bright colors, special odors, or nectar.
Small.
Most have no petals.
please help me on this coding problem :)
Consider the following code segment.
int a = 0;
int b = 3;
while ((b != 0) && ((a / b) >= 0)
{
a = a + 2;
b = b - 1;
}
What are the values of a and b after the while loop completes its execution?
a = 4, b = 1
a = 0, b = 3
a = 6, b = 0
a = 8, b = -1
Answer:
a=4 , b=1
Explanation:
I'm not a computer science major at all but I think I can help you with this code.
Our program wants us to add 2 to a get new a value while also subtracting 1 from b value to obtain new b value. We we want to for for as long b is not 0 and a/b is nonnegative.
One round we get:
New a=0+2=2
New b=3-1=2
Let's see if we can go another round:
New a=2+2=4
New b=2-1=1
We can't go another round because b would be negative while a is positive which would make a/b negative. So our loop stops at this 2nd round.
a=4 , b=1
Other notes:
2nd choice makes no sense because a is always going to increase because of the addition on a and b was going to decrease because of the subtraction on it.
Third choice makes no sense because a/b doesn't even exist.
Fourth choice a/b is negative not nonnegative.
Helllp me you will git 16 points
Answer:
False
Hope it helps...
Have a great day :P
13. Which statement is valid?
1 KB = 1024 bytes.
1 MB = 2048 bytes
1 MB = 1000 kilobytes
1 KB = 1000 bytes
Answer:
1 KB = 1024 bytes is correct
Explanation:
Answer:
1 KB = 1000 bytes
Is valid.
Hope it will help :)❤
When is blue for when the instance in which the directory of compulsion in the air!
Aliah finds an old router that does not support channel bonding. What frequency are the channels limited to?
A.
10 MHz
B.
20 MHz
C.
40 MHz
D.
80 MHz
evaluate the arithmetic expression 234+567
Answer:
801
Explanation:
234 + 567 = 801
Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months. After a year, he was not allowed to update the software. However, he could continue using it. Why did the updates stop?
Group of answer choices.
A. The software was corrupt and resulted in a bug.
B. He purchased a license with maintenance for a year.
C. The organization discontinued the software.
D. He purchased an open-source license.
E. He purchase a perpetual non-maintenance license.
Answer:
B. He purchased a license with maintenance for a year.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
Basically, softwares are categorized into two (2) main categories and these are;
I. Open-source software.
II. Proprietary software.
A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
In this scenario, Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months. However, after a year, he was not allowed to update the software but he could continue using it.
This ultimately implies that, Wesley purchased a licensed software with maintenance for a year and as such he would stop receiving an update from the software developer after his subscription expired.
Which of the following statements is true for DMA: (only one correct answer) A. In DMA, Processor checks status until the operation is complete B. In DMA, Processor is interrupted when I/O module ready to execute data C. In DMA, no interrupt is produced D. In DMA, interrupt is sent when the task is completed E. None of the above
Answer:
D. In DMA, interrupt is sent when the task is completed
Explanation:
Note, the term Direct Memory Access simply refers to a computer feature that allows hardware subsystems to directly access the main system memory of a computer, without any the aid of the central processing unit (CPU).
It is a fact that while the transfer process is ongoing, an interrupt (interrupt signal) is not sent until when the task is completed.
Where should a photographer place lights for a headshot? Headshot lighting is more important with darker backgrounds. The light should be at a 45-degree angle from the subject. The light should be in front of the subject. The third light should be the subject to form a ring of light around the subject’s hair.
Answer:
Headshot lighting is more important with darker backgrounds. The
(key) light should be at a 45-degree angle from the subject. The
(fill) light should be in front of the subject. The third light should be
(behind) the subject to form a ring of light around the subject’s hair.
Explanation:
i searched it up individually and thats what i got
You have just started a new job as the administrator of the eastsim domain. The manager of the accounting department has overheard his employees joke about how many employees are using "password" as their password. He wants you to configure a more restrictive password policy for employees in the accounting department. Before creating the password policy, you open the Active Directory Users and Computers structure and see the following containers and OU: eastsim Builtin Users Computers Domain Controllers Which steps must you perform to implement the desired password policy? (Select three. Each correct answer is part of the complete solution.)
Explanation:
To implement the desired password policy, you have to carry out these steps
1. An organizational unit, OU has to be created for these employees in east-sim.com
2. Since there is an organizational unit created for the accounting employees, you have to put the employees user objects in this Organizational unit.
3. Then as the administrator the next step that i would take is the configuration of the password policy, then i would link this to the already created organizational unit for these employees