Answers

Answer 1

multi tasking is the act of doing more than one thing at the same time

Answer 2

Answer:

Multitasking, the running of two or more programs (sets of instructions) in one computer at the same time. Multitasking is used to keep all of a computer's resources at work as much of the time as possible


Related Questions

Select the correct answer.
A student is browsing a website. While browsing, he clicks on a link that takes him to another website. Which code gives the correct format of the
external link?

Answers

Answer:

(B) because on a website IT HAS TO HAVE "WWW." first

is monitor is a television​

Answers

Answer: Can you rephrase the question

Explanation:

Who did Connie Macpherson think her visitor was?​

Answers

Connie Macpherson thought that her visitor was her husband,Jim!

I hope it will helps you!

You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes from time to time. You want to look at a report that shows important events for the server since it was installed. You'd like to see when software was installed and if there are any hardware or application failures. What is the simplest way to view this information

Answers

Answer: Open Reliability Monitor.

Explanation:

The simplest way to view this information is to open the reliability monitor.

The Reliability Monitor shows you the stability history of a system at a glance and also allows one to see the details of the events that has an effect on reliability on a daily basis.

The reliability and problem history chart which can be seen in the Reliability Monitor helps in keeping track of the overall health of the server on a daily basis.

What do you suggest for Father's Day?​

Answers

A gift or maybe something homemade that means something special to you and or you dad

What can queries provide that viewing a table in Datasheet view cannot provide?

Answers

Answer:

D) data from more than one table

Explanation:

Just took it!

Why do people enjoy codehs

Answers

Answer: this is a moral question, but here is my view

Explanation:

we get to learn about things like java which i am currently learning for AP computer science A

Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.​

Answers

The answer is A hope I helped
The answer would be a

Which of the following is recalling the main points of a text?

Answers

Answer:

Option A< Rote learning

Explanation:

Options for given question

a) Rote learning

b) memorizing

c) Adapting

d) Seeming

Recalling of facts is associated with rote learning in which the education is de-emphasized in the form of science

Hence, option A is correct

Rinaldo and his game design team have

Answers

Answer:

HAVE DA baby

Explanation:LLLLLLLLLLLLLLLLLLLLLETS GOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO

Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
O SmartArt.
O WordArt.
O Clip Art
O Pictures

Please help ASAP

Answers

Answer:

clip art

Explanation:

i hope this helps you

statement
Looping
WAP to display
name 50 times.​

Answers

Answer:

can you specify what program you're doing this in? I can do qbasic and maybe python

Ethan wants to change the font in his document. He should _____.

delete the text, select a font, and type
select a new font and highlight the text
highlight the text and select a new font
zoom in on the text, click on style, and make a selection

Answers

Answer:

C because it will work. I tried that a lot of time with documents.

Explanation:

Answer:

Ethan wants to change the font in his document. He should _____.

A. delete the text, select a font, and type

B. select a new font and highlight the text

C. highlight the text and select a new font

D. zoom in on the text, click on style, and make a selection

It is highlight the text and select a new font

Explanation:

When numbers are formatted in percent format, they are multiplied by _______ for display purposes.

1000
100
10
20

Answers

They are multipled by 100
They are multiplied by 100


2. Which Interface uses
images/icons to make it easier for
the user? *
Command Line
Graphical
Voice Command
Textbased​

Answers

Answer:

Voice Command

Explanation:

correct me if I am wrong✔

Q1. Which implementation of Network Access Control checks users' credentials to determine what level of access they should have to a top-secret file?

A. ACE
B. DAC
C. MAC
D. RBAC

Q2. Which physical access control uses a portable device that authenticates a person's identity electronically by storing some sort of personal information?

A. Infrared scanners
B. Hardware security tokens
C. Biometric devices
D. Keypads

Q3. Which implementation of Network Access Control grants access depending on a specific job role?

A. DAC
B. RBAC
C. MAC
D. PAC

Q4. Which implementation of Network Access Control is more relaxed, allowing users to determine file access privileges?

A. AAC
B. MAC
C. DAC
D. RBAC

Q5. Which type of access control sets the standard for the way security actions unfold?

A. Identity
B. Management
C. Physical
D. Technical

Answers

Answer:

1. MAC

2. Biometric Devices

3. RBAC

4. DAC

5. Management

Explanation:

Q.1) Option c) MAC

Q.2) Option c) Biometric devices

Q.3) Option b) RBAC

Q.4) Option c) DAC

Q.5) Option b) Management

What is MAC ?

The ability of individual resource owners to allow or refuse access to resource objects in a file system is constrained by the security measure known as mandatory access control (MAC).

What is a biometric device ?

An authentication and security identification tool is a biometric gadget.

What is RBAC ?

Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system.

What is DAC ?

The idea behind discretionary access control is to limit access to things based on who the subject is.

Therefore, MAC, biometric device, RBAC, DAC and Management access control sets are some of the measures for network security and access control.

You can learn more about network security from the given link

https://brainly.in/question/33317398

#SPJ2

A dictionary is also known as

Answers

Answer:

wordbook, lexicon or vocabulary

Explanation:

learned, dunno what lesson ur doing tho

Climax Medical Technology, a fast-growing global research firm, has accumulated so much client information that conventional database management systems cannot handle its customers' needs. Therefore, Climax purchased very sophisticated analysis software and supercomputing-level hardware. Climax Medical Technology is tapping the power of Group of answer choices mega IT. new age computing. super data. cyber-age databases. Big Data.

Answers

Answer:

big data.

Explanation:

It is correct to say that by implementing very sophisticated analytics software and supercomputing level hardware, Climax Medical Technology is harnessing the power of big data.

This is a tool capable of storing a large volume of data and making them available for organizational management in a structured, strategic and informative way, which helps an organization to achieve a competitive advantage in the market.

Big Data makes structured and unstructured data accessible to a company, so that they can use them intelligently for business solutions and to aid in the management and data collection process, helping to create more value and continuous improvement in an organization.

You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15 cubicles where employees work with their mobile devices. You test connectivity from all locations and find that signal strength is good throughout the room. Several months later, you are called to troubleshoot connectivity problems at the site. You find that the large room was divided into two smaller rooms by a floor to ceiling wall with metal studs. What is the most likely reason for the connectivity problems

Answers

Answer:

interference

Explanation:

The most likely reason for the connectivity problems is interference. This interference can be caused by many factors but in this scenario the most likely factor would be the metal studs and all the metal used to create the ceiling/floor. Metal is a huge interference when it comes to wifi signals. Depending on the type of metal and the amount it can greatly diminish the signal strength or even completely prevent the signal from passing to it's destination, regardless of how close the destination device is located.

5.What is returned by the call go(30)?
public static String go ( int x)
{
String s = "";
for (int n = x; n > 0; n = n - 5)
S = S + x +
return s;}

Answers

Answer:

The string returned is: 303030303030

Explanation:

Given

The above method

Required

The returned string

The method returns a string that is repeated x/5 times.

Take for instance;

x = 30

The method will return a string that contains x in 30/5 (i.e. 6) times

Hence, the result of go(30) is 303030303030

describe the third generation of computers​

Answers

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry.

The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.

Third Generation

The main features of third generation are −

IC used

More reliable in comparison to previous two generations

Smaller size

Generated less heat

Faster

Lesser maintenance

Costly

AC required

Consumed lesser electricity

Supported high-level language

Some computers of this generation were −

IBM-360 series

Honeywell-6000 series

PDP (Personal Data Processor)

IBM-370/168

TDC-316

Which media example would be best for mayas presentation

Answers

Answer: c. a diagram that explains the steps involved in photosynthesis

Explanation:

The best graphic to use would be one that explains the processes involved in the process of photosynthesis. The best option is therefore the third one as it would actually show useful information on what photosynthesis is and how plants use it to get energy.

The first option would not educate anyone on what photosynthesis is as it does not talk about the process. The second and fourth options are the same.

the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m. ​

Answers

The computers that communicate with each other are called [tex]\sf\purple{transmission \:control\: protocol\: (TCP)}[/tex].

[tex]\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{!}}}}}[/tex]

What do we call the research techniques that try to predict the future?

Answers

Predictive Analytics

Explanation:

It describes the application of a statistical or machine learning technique to create a quantitative prediction about the future.

39 POINTS !
Okay so basically I have a 60 percent keyboard, and it’s LED perfect in shape jkeyboard okay.
I try connecting it to my ps4 and it’s detected but it won’t light up nor will any of the keys respond.
I have tried resetting my ps4
Iv’e tried unplugging and replacing in
I’ve tried holding FN and N to disable the n rollkey
I be tried plugging it into a pc
But nothing wors does anyone know how to fix it?

Answers

Answer:

Contact a service center electronics management

Answer:

take it back to the store with your the receipt and get a new one

What is one common way to select a package name for a project?

Select one:

a.
Use a company's domain name for uniqueness


b.
Use a very short name to save typing


c.
Use a secret phrase like a password


d.
Use an encryption key for security

Answers

Answer:

Jeez idrk

Explanation:

Akkaqka

Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user. Before transmission, you hash the message and then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. Which protection does the private key-signing activity of this process provide

Answers

Answer: integrity

Explanation:

Hashing refers to changing a string of characters into shorter fixed-length value which represents the original string. Hashing is faster to find items in the database.

Based on the information given, the protection that he private key-signing activity of this process provide us integrity.

¿Como explicarian que es un programa y la diferencia con el concepto de software y aplicacion.

Answers

Answer:

Un programa de computadora es un conjunto de instrucciones que una computadora puede entender, escrito en un lenguaje de programación específico, en el caso de lenguajes de bajo nivel también en una arquitectura de computadora específica. En la mayoría de los casos, los programas se compilan en un formato que la computadora puede entender. A su vez, el conjunto de programas de una computadora es denominado software, mientras que una aplicación es un tipo específico de programa informático, especialmente utilizado en teléfonos móviles.

Scrieți un program care citește un număr natural n și determină suma cifrelor divizibile cu 3 ale lui n.

Date de intrare
Programul citește de la tastatură numărul n.

Date de ieșire
Programul va afișa pe ecran, c, suma cifrelor divizibile cu 3 ale lui n,
Exemplu
Intrare

7360914
Ieșire

18

Answers

Sorry I don't understand your question

When you use a business class with an object data source, the business class Group of answer choices must have attributes that match the names of the bound fields must have public properties that match the names of the bound fields must have a constructor with parameters that match the names of the bound fields must have get and set procedures that match the names of the bound fields

Answers

Answer: must have public properties that match the names of the bound fields

Explanation:

When a business class is used with an object data source, the business class must have public properties that match the names of the bound fields.

Having an attribute which match the names of the bound fields isn't necessary as well as having a constructor with parameters that match the names of the bound fields

Therefore, the correct option is B.

Other Questions
what poetry term the big fat cat sat on the mat How could this outline be improved to be moreReview the outline of an informative report aboutocean pollutioneffective?abc1. Introduce the topic of the effects of ocean pollution.A. Mention how much garbage, including plastic, isfloating in the oceans.B. Mention how preventing dumping of plastics canslow the release of greenhouse gases.II. Discuss key findings about the amount of garbageinIt should be revised to mention the main topic.It should include a recommendations section.O It should include key findings related to the topic.o It should be organized into an effective structure.the ocean.A. Millions of tons of garbage enter the oceanseachyear.B. There are floating garbage patches in the ocean.III. Preventing the dumping of plastics can slow therelease of greenhouse gases.A. Sunlight causes plastic to release greenhousegasesMark this In the "Lord of the Flies", how do they attempt to be rescue?a. jack suggest they burn down part of the forest as a signalb. ralph suggest they build a fire to use as a signal c. piggy suggest they build a fire to use as a signald. jack suggest they make a massage with stones in the jungle The sum of three consecutive even integers is 108. What is the largest number help me please, i put the othe options bellow I saw one eyed girl (a an the) Give 15 facts about the American Revolution. simplify each expression. State any excluded values, Show your work. 2x^2+6x/10x^3 help Patrick made a scale drawing of a newly planted hotel the height of the scale drawing is 27 inches what would be the actual height, in meters, of the hotel if it was constructed. pls hurry lol Most of the Southern States were a part of the __________States of America during the Civil War. WILL MARK BRAINLIEST!!!!Kim's into mystery fiction stories. Her current book is 400 pages long. She has read 60 pages so far. If she plans to read 34 pages a night till she finishes, how many nights will Kim read? Which equation with a variable represents this situation. *1) 400 + 60 + 342) 34 +60 = 4003) 34n + 60 = 4004) 34 + 60n =400 NEED HELPA 0.558 kg block of copper at 117C comes in contact with a 1.11 kg block of aluminum at 15.8C. What is their equilibrium temperature? how was the labour of the chinese railway workers important in completing the union of canada? Hello Everyone hw y'all doin can someone pls write an essay on :" online shiksha ke labh aur hani"IN HINDI .... it's a. not sure if its B. I'll give branliest! What is the historical significance of ancient Roman holidays/traditions? *3. All of the following liberties are included in the First Amendment exceptFreedom of speechO Freedom of religionO Freedom of schoolingFreedom of the press. The arrival of the railroads to the territory in the late 1800s helped bring an end New Mexicos_____________. Which number is closest to the square root of 48 ?5.97.36.96.3 Which of the following statements is true? A. An HIV-positive person can stay healthy as long as they start HIV medication and continue taking the medicine as prescribed. B. At the moment, there are no medications that control HIV so that someone who is HIV-positive can manage the virus and live longer.C. HIV is the illness that follows once AIDS has weakened the person's immune system so that it cannot fight off infection.D. The human body can rid itself of HIV completely, just like it can with a number of other contagious viruses.