Answer:
Polymerization, any process in which relatively small molecules, called monomers, combine chemically to produce a very large chainlike or network molecule, called a polymer. The monomer molecules may be all alike, or they may represent two, three, or more different compounds.please give me brainliest~❤︎ت︎All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not been initialized properly Dereferencing a null pointer Dereferencing a pointer that has not been assigned to point to a specific address Dereferencing a variable that is not a pointer
Answer: Dereferencing a variable that is not a pointer
Explanation:
The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.
Some of the reasons for a fatal execution-time error include:
• Dereferencing a pointer that has not been initialized properly
• Dereferencing a null pointer
• Dereferencing a pointer that has not been assigned to point to a specific address.
It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.
Which of the following is not one of the goals of technical recovery team members during the recovery phase of a BCP? Normalize operations. Restore temporary operations to critical systems. Repair damage done to original systems. Recover damage to original systems.
Answer:
Repair damage done to original systems
Explanation:
It is imperative that businesses brace up for moments or period of challenges whereby normal operation is impeded due to disruption in standard system condition. The ability of businesses to thrive and continue to deliver in these circumstances is catered for by the business continuity plan. The recovery team ensures that important processes critical to the business are restored in other to ensure that business operation isn't crippled. Once normalcy ahs been restored, the team ensures recoverabke day in the original system are taken care of. The repair of damage done is not a goal of the recovery ohase in the business continuity plan as repairsvare catered for after recovery event has been finalized.
1-How many moles of NazCOs are in 10.0 ml of a 2.0 M solution?
Answer:
A solution is a mixture in which the particles are so small that the components are indistinguishable from each other. The amount of the solute and the solvent in a solution can be expressed in terms of different concentration expressions such as molarity, morality, etc.
Explanation:
To calculate the number of moles of sodium carbonate, the volume in liters will be multiplied by the molar concentration of the solution.
moles Na2CO3 = 2.0 M x 0.0100 L = 0.020 moles Na2CO3
Hope it helps :)
Answer:
There are 20. mol of Na2CO3 in 10.0L of 2.0M solution.
Explanation:
Molarity is represented by this equation:
(look at attachment)
In our case, we already have the molarity and volume of solution, both of which have good units.
Let's rearrange the equation to solve for the number of moles. We can do this by multiplying by L solution on both sides of the equation. The L solution will cancel out on the right side, leaving the number of moles being equal to the molarity times volume:
Moles of solute
=Lsolution×Molarity
Now we just plug the known values in!
Moles of solute = (10.0 L) (2.0M) = 20. moles
hardware and costs of adding two levels of hardware RAID. Compare their features as well. Determine which current operating systems support which RAID levels. Create a chart that lists the features, costs, and operating systems supported.
Explanation:
1. Redundant batch of Inexpensive Drives (or Disks) (RAID) is a term for data storage schemes that divide and/or replicate data amid multiple hard drives.
2. RAID can be designed to provide increased data accuracy or increased Input/Output performance
Hardware RAID exists as a customized processing system, utilizing various controllers or RAID cards to control the RAID design independently from the OS. Software RAID utilizes the processing capacity of that computer's operating system in which the RAID disks exists installed.
What are the two types of RAID?
We have two kinds of RAID implementation through. Hardware and Software. Both these implementation contains its own benefits and drawbacks.
Software RAID does not count any cost for a RAID controller and exists fairly effortless to estimate the cost of as you exist only buying additional drives. All of our usual dedicated servers come with at least two drives, indicating there exists NO cost for software RAID 1, and stands positively suggested. It exists positively suggested that drives in a RAID array be of the exact type and size. With RAID 0 or RAID 1, you'd require at least two drives, so you would require to buy one additional drive in most cases. With RAID 5 you'll require at least three drives, so two additional drives, and with RAID 6 or 10 you'd require at least four total drives. To earn additional implementation, redundancy, or disk space, you can count more disks to the collections as well.
To learn more about two types of RAID
https://brainly.com/question/19340038
#SPJ2
An OpenCL Device is composed of: Group of answer choices Command Queues Platforms Processing Elements Compute Units
Answer:
Compute Units
Explanation:
A platform can be defined as a computing environment for building and executing sets of code in a software application or program such as an application programming interface (API).
The two parts of the platform used to run an application software are both hardware and software (operating system).
Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but understandable to computers.
OpenCl is an abbreviation for open computing language that runs on CUDA-powered graphics processing units (GPUs). An OpenCL Device is composed of compute units and an OpenCl compute unit typically comprises of processing elements.
8. (a) Write the following statements in ASCII
A = 4.5 x B
X = 75/Y
Answer:
Explanation:
A=4.5*B
65=4.5*66
65=297
1000001=11011001
10000011=110110011(after adding even parity bit)
X=75/Y
89=75/90
10011001=1001011/1011010
100110011=10010111/10110101(after adding even parity bit)
what is internet? explain help pliz
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
b) Set of strings of 0s and 1s whose 5th symbol from left is 1.
Answer:
...?
Explanation:
Select all phrases that describe a server-based network. centralized network security easy to expand log-ins controlled by central server unlimited number of users network resources stored on individual workstations
Answer:
Client Server Network ... is the central computer that enables authorized users to access networked resources ... computers in this type of network are connected to a central hub ... why might a business choose a server based network (3) ... 2) easier to expand ... external hardware connected to and controlled by a computer.
Explanation:
Answer
Explanation:
what the other person said
A network consists of 75 workstations and three servers. The workstations are currently connected to the network with 100 Mbps switches, and the servers have 1000 Mbps connections. Describe two network problems that can be solved by replacing the workstations' 100 Mbps switches and NICs with 1000 Mbps switches and NICs. What potential problems can this upgrade cause
Answer:
A) i) starvation ii) flow control
B) Network congestion
Explanation:
A) Network problems that can be addressed / solved
By replacing the workstations 100 Mbps switches with 1000 Mbps switches the problem of
Starvation; been faced by the servers due to the delay in sending data to be processed by the servers from the workstations will be resolved .
Flow control : The huge difference in the speeds of the workstations and servers causes a network buffer which leads to packet loss therefore when the workstations 100 Mbps switch is replaced with 1000 Mbps switch this network problem will be resolved
b) The potential problem that can be encountered is Network Congestion
Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly become ready at once, how many bit slots are needed to resolve the contention
Answer:
11 bit slot will be needed
Explanation:
The number of prime numbers between 1 through 16
= 2, 3 , 5, 7, 11 and 13
hence we can say 6 stations are to use the shared channel
Given that all the stations are ready simultaneously
The number of bit slots that will be needed to handle the contention will be 11 bits :
slot 1 : 2, 3, 5 , 7, 11 , 13
slot 2 : 2,3, 5, 7
slot 3 : 2, 3
slot 4 : 2 . slot 5 : 3 . slot 6 : 5,7. slot 7 : 5 . slot 8 : 7. slot 9: 11,13.
slot 10 : 11. slot 11 : 13
When adding several user accounts, you might want to use the newusers utility, which can process a text file full of entries to add user accounts. Use the man or info page to find out how to use this utility, and use it to add three users. When finished, view the /etc/passwd, /etc/shadow, and /etc/group files to verify that the users were added successfully.
Explanation:
Given - When adding several user accounts, you might want to use the new users utility, which can process a text file full of entries to add user accounts.
To find - Use the man or info page to find out how to use this utility, and use it to add three users.
Proof -
New Users Utility:
It is an utility which reads the file full of usernames and clear text passwords.
It then uses this information to update a group of the existing users to create new users.The format of the file consists of specified things like:
pw - passwd
pw - age
pw - gid
pw - dir
Use of the Utility:
The command is new users filename
The file should look like -
(Username : Password : UID : GID : User Information : Home Directory : Default Shell)
where ,
UID = User Identifier
GID = Group Identifier
Testing the Users:
Creating users from the file given above test User 1, directory Of File
Executing the create user new users directory Of File
Repeat this step to undergo all the users that are been noted down in the file to make them a user in the noted group policy.
Hence,
These are the steps of using the new Users utility.
If the user enters any operator symbol other than , -, *, or /, then an UnknownOperatorException is thrown and the user is allowed to reenter that line of input. Define the class UnknownOperatorException as a subclass of the Exception class. Your program should also handle NumberFormatException if the user enters non-numeric data for the operand.
Answer:
Explanation:
The following code is written in Java. It creates the UnknownOperatorException class and catches it if the user enters something other than the valid operators. If so it continues asking the user for a new input. Once a valid operator is entered, it exits the function and prints the operator.
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
char symbol = askForOperand();
System.out.println("Operand: " + symbol);
}
public static char askForOperand() {
Scanner in = new Scanner(System.in);
try {
System.out.println("Enter operator symbol: ");
char symbol = in.nextLine().charAt(0);
if ((symbol != '-') && (symbol != '*') && (symbol != '/')) {
System.out.println(symbol);
throw new UnknownOperatorException();
} else {
return symbol;
}
} catch (NumberFormatException | UnknownOperatorException e) {
System.out.println("Not a valid operand");
char symbol = askForOperand();
return symbol;
}
}
}
class UnknownOperatorException extends Exception {
public UnknownOperatorException() {
System.out.println("Unknown Operator");
}
}
Imagine running a 64-bit system on a 32-bit system, where we simulate a single 64- bit memory location (register) using two atomic 32-bit memory locations (registers). A write operation is implemented by simply writing the first 32-bits of the simulated 64-bit register in the first real register, then the second 32-bits in the second real register. A read, similarly, reads the first half from the first register, then the second half from the second register, and returns the concatenation. What is the strongest property that this 64-bit register satisfies: safe, regular, or atomic
Answer:
It's not possible to ensure memory access occurs indivisibly when it has to broken into multiple operations. Unfortunately, the fact that your application is running on a 64-bit kernel does not change the equation any - it is actually running in a compatibility layer and has none of the benefits of x64
Explanation:
Write a program that will create an array of random numbers and output the values. Then output the values in the array backwards. SPECIFICATIONS: File name: ArrayBackwards.java Your program must make use of at least one method other than main()to receive full credit (methods can have a return type of void). Suggestion: create and populate the array in the main() method. Make a method for Step 3 below and send in the array as a parameter. Make another method for Step 4 and send in the array as a parameter.
Answer:
The program is as follows:
import java.util.*;
public class Main{
public static void backward(int [] Rndarray, int lnt){
System.out.print("Reversed: ");
for(int itm = lnt-1;itm>=0;itm--){
System.out.print(Rndarray[itm]+" "); } }
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int lnt = input.nextInt();
Random rd = new Random();
int [] Rndarray = new int[lnt];
for (int itm = 0; itm < lnt; itm++) {
Rndarray[itm] = rd.nextInt();
System.out.print(Rndarray[itm]+" ");
}
System.out.println();
backward(Rndarray,lnt); }}
Explanation:
This defines the backward() method
public static void backward(int [] Rndarray, int lnt){
This prints string "Reversed"
System.out.print("Reversed: ");
This iterates through the array
for(int itm = lnt-1;itm>=0;itm--){
Each element is then printed, backwards
System.out.print(Rndarray[itm]+" "); } }
The main begins here
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
This gets the array length
int n = input.nextInt();
This creates a Random object
Random rd = new Random();
This declares the array
int [] Rndarray = new int[lnt];
This iterates through the array for input
for (int itm = 0; itm < lnt; itm++) {
This generates a random number for each array element
Rndarray[itm] = rd.nextInt();
This prints the generates number
System.out.print(Rndarray[itm]+" ");
}
This prints a new line
System.out.println();
This passes the array and the length to backward() method
backward(Rndarray,lnt); }}
what is the value of 2020/20×20
Answer:.5.05
Explanation:...maths
Answer:
5.05
Explanation:
2020/400= 5.05
HOPE IT HELPED AND GOOD LUCK!!
how do you record your own video game Music and post Them on yt
Answer:I would try downloading a beat app and making a song,then posting
Explanation:
Which of the following tools helps ensure your document will open in older versions of word
Answer:
Compatibility Check
Explanation:
Select File > Info.In the Inspect Document section, select Check for Issues > Check Compatibility.Click Select versions to show. A check mark that appears next to the name of the mode that the document is in.Evaluation of your strengths and weaknesses
a. Self Assessment b. Employee
c. Entrepreneurship d. Entrepreneur
いt 背lfまyべラテぇrべit is a lolololol idek ima just stop
Write function d2x() that takes as input a nonnegative integer n (in the standard decimal representation) and an integer x between 2 and 9 and returns a string of digits that represents the base-x representation of n.
Answer:
The function in Python is as follows:
def d2x(d, x):
if d > 1 and x>1 and x<=9:
output = ""
while (d > 0):
output+= str(d % x)
d = int(d / x)
output = output[::-1]
return output
else:
return "Number/Base is out of range"
Explanation:
This defines the function
def d2x(d, x):
This checks if base and range are within range i.e. d must be positive and x between 2 and 9 (inclusive)
if d >= 1 and x>1 and x<=9:
This initializes the output string
output = ""
This loop is repeated until d is 0
while (d > 0):
This gets the remainder of d/x and saves the result in output
output+= str(d % x)
This gets the quotient of d/x
d = int(d / x) ----- The loop ends here
This reverses the output string
output = output[::-1]
This returns the output string
return output
The else statement if d or x is out of range
else:
return "Number/Base is out of range"
Write a function called csv_sum that takes a filename and returns the sum of all of the numbers in the file. The numbers are in csv format. For instance, if the contents of the file are: 12,3,2 -5 10,20,-10,8.3 Then the function should return 40.3.
Answer:
Explanation:
def csv_sum(filename):
total = 0
try:
f = open(filename)
for line in f:
words = line.strip().split(",")
for word in words:
total += float(word)
f.close()
except FileNotFoundError:
pass
return total
Which statement describes Augmented Reality (AR) technology?
Answer:
Augmented Reality (AR) superimposes images and audio over the real world in real time. It does allow ambient light and does not require headsets all the time.
yan po ang szgot
wala po kasi pagpipilian
HOPE IT HELPS
pls follow ke
(2) What are the limitations of portable computer?
Answer:
Most portable computer are not upgradable and they have a lower specification than most desktop systems
With the addition of electric cars, we have a need to create a subclass of our Car class. In this exercise, we are going to create the Electric Car subclass so that we can override the miles per gallon calculation since electric cars don’t use gallons of gas.
The Car class is complete, but you need to complete the ElectricCar class as outlined in the starter code with comments.
Once complete, use the CarTester to create both a Car and ElectricCar object and test these per the instructions in the CarTester class.
Classes
public class CarTester
{
public static void main(String[] args)
{
// Create a Car object
// Print out the model
// Print out the MPG
// Print the object
// Create an ElectricCar object
// Print out the model
// Print out the MPG
// Print the object
}
}
////////////////////////////
public class ElectricCar extends Car {
// Complete the constructor
public ElectricCar(String model){
}
// Override the getMPG here.
// It should return: "Electric cars do not calculate MPG.
// Override the toString() here.
// (model) is an electric car.
}
//////////////////////////////////
public class Car {
//This code is complete
private String model;
private String mpg;
public Car(String model, String mpg){
this.model = model;
this.mpg = mpg;
}
public String getModel(){
return model;
}
public String getMPG(){
return mpg;
}
public String toString(){
return model + " gets " + mpg + " mpg.";
}
}
Which statement about parallax scrolling is true?
A.
Parallax scrolling distorts the position of the player character when playing the game.
B.
Parallax scrolling involves segmenting the playing area into background layers that move slower than the foreground layers.
C.
Parallax scrolling involves unifying the playing area into a single environment.
D.
Parallax scrolling involves segmenting the playing area into background layers that move faster than the foreground layers.
E.
Parallax scrolling involves segmenting the playing area into background layers and foreground layers that move at the same speed.
Answer:
The answer is B
Explanation:
I wrote down every slide of this lesson by hand lol. Good luck on the final <3
You work for a large company that has over 1000 computers. Each of these computes uses a wireless mouse and keyboard. Therefore, your company goes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you must decide what to do with them. Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries?
They must be sent to hazardous waste collection
a. They can be recharged.
b. They must be stored onsite until they expire
c. They can be thrown in the trash.
The answer to this question is, "They can be thrown in the trash."
Explanation: This is because it specifies how to get rid of them UNLESS local authorities have told you otherwise.
Select the correct answer.
What should you keep in mind when picking a topic for a research paper?
ОА.
choosing a general topic
OB.
choosing a topic that is relatively new
O C.
choosing a specific topic rather than a broad one
OD. choosing a topic based on the most number of sources you can find
Reset
Next
Answer: The answer is C
Explanation: When it comes to research papers your topic shouldnt be too broad. Your topic should be broad enough you can find a good amount of information but not too focused that you can't find any information.
write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles.
Answer:
try this
Explanation:
km = float(input('Kilometers: '))
nm = (km * 5400) / 10000
print('%0.4f km = %0.4f Nautical Miles' %(km,nm))
PLEASE HELP ASAP!!
This command allows you to duplicate text from one part of a document while keeping the original text.
Cut
Copy
Format
Paste
Answer: CTRL + C or copy and paste
Explanation: to copy and paste highlight text by dragging mouse or clicking on touchpad and holding over selected text, if not on a computer but on a touch screen device ( ex: Phone, iPad etc) hold down until it is blue use the tear drops from the top and bottom to highlight the text you need. Then hold down the blue area until options come up stop holding and select copy and then go to where you want to put the text and hold down again and select paste. If on computer drag cursor over text while holding down on left click or holding down on touchpad, it will highlight light blue then left click or click on the touchpad with both fingers and repeat the process of copying and pasting as said before.
Hope this helps! :)
Why do organizations need to tailor project management concepts, such as those found in the PMBOK® Guide, to create their own methodologies?
Explanation:
Although each project is different and unique, according to the Method Statement of PMBoK, customising is required. Not that every procedure, tool, methodology, input, or output listed in the PMBoK Guide is mandated for every project. Scope, timeline, cost, materials, quality, and danger should all be considered while tailoring.