What manages and controls the speed of a motherboard's buses? *

RAM
CPU
Chipset
L1 cache

Answers

Answer 1

A bus is simply a circuit that connects one part of the motherboard to another. The back side bus connects the CPU with the level 2 cache. The processor determines the speed of the back side bus. The memory bus connects the northbridge to the memory.

I hope this helps

Answer 2

Chipset manages and controls the speed of a motherboard's buses, Items installed on the motherboard include the CPU and RAM.

What is the speed of a motherboard's buses?

The motherboard is managed by the chipset, it is used to transfer data to and from the CPU and other PC components or PCs.

The path on the motherboard of the PC used to carry data to and from the CPU and other PC components is known as a PC bus, commonly referred to as "the bus." This includes software-to-software communication. The backside bus's speed is set by the processor.

The northbridge and memory are linked by the memory bus. The southbridge is linked to the disk drives through an IDE or ATA bus. The video card is linked to the CPU, memory, and AGP bus.

Therefore, option C is correct.

Learn more about motherboards, here:

https://brainly.com/question/6968002

#SPJ2


Related Questions

in pycharm, write a program that prompts the user for their name and age. your program should then tell the user the year they were born. here is a sample execution of the program what is your name? Amanda how old are you? 15. This is what I have so far but I can't get pycharm to tell me the year I was born.
import datetime

name = input("What is your name? ")

age = input("How old are you? ")

year = datetime.datetime.now().year

print("Hello ' + name + ' you were born in " (year - age))

Answers

Let's address the few mistakes in your code so far. First, age is of type string and year is of type int. You're trying to subtract an int by a string and that doesn't work. Also, you have inconsistent quotes "Hello '. You should always use the same type of quote. The (year - age)) isn't properly formatted into the print statement. There is no plus adding it.

Here's my working code:

import datetime

name = input("What is your name? ")

age = int(input("How old are you? "))

year = datetime.datetime.now().year

print("Hello " + name + " you were born in " + str((year - age)))

I just fixed your code. Best of luck.

In python, date and time seem to be not its type of data, but the date and time named module can be imported for it to work with the time and date. So, the program and its description can be defined as follows:

Program Explanation:

Importing "datetime" package.Defining two-variable "name, age" in which we input value from user-end.Defining another variable "year" that holds current year value.In the next step, the print method has used that prints the user name with the born year.

Program:

import datetime#import package datetime

name = input("What is your name? ")#defining a variable name that uses an inputs method to input string value

age = int(input("How old are you? "))#defining a variable age that uses an inputs method with the int to input value

year = datetime.datetime.now().year#defining a variable year that takes current value in it

print("Hello " + name + " you were born in " + str((year - age)))#defining a print method that print name value with born year

Output:

Please find the attached file.

Learn more:

brainly.com/question/19032453  

A Protocol for networked information​

Answers

Answer:

Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level; and. additional network protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each of which has defined sets of rules to exchange and display information.

Explanation:

could i plz have brainliest so close to next rank

HELP URGENTLY!!!!!

Elly supervises an eye doctors office. The office recently received new equipment. To keep that equipment working accurately and dependably, she should:
(Select all that apply.)

Copy the users manual and distribute to all the employees
Identify individuals to complete the tasks
Create a log to document maintenance
Set up auto reminders
Read the manual
List the maintenance tasks
Establish the frequency of the maintenance tasks
Update the software in the office

Answers

Note that where Elly supervises an eye doctor's office, and the office recently received new equipment, to keep that equipment working accurately and dependably, she should:

Copy the users manual and distribute to all the employeesCreate a log to document maintenanceSet up auto remindersRead the manualList the maintenance tasksEstablish the frequency of the maintenance tasksUpdate the software in the office.

What is the rationale for the above response?

In order to ensure that the equipment is working properly and optimally, Elly should distribute the user manual to all employees.

In addition, she should identify individuals to complete maintenance tasks, create a log to document maintenance, set up auto reminders, read the manual, list the maintenance tasks, establish the frequency of the maintenance tasks, and update the software in the office to keep new equipment working accurately and dependably. This will ensure optimal equipment maintenance and lifetime.

Learn more about equipment maintenance:

https://brainly.com/question/21853224

#SPJ1

4.9 Code Practice: Question 4 Edhisive

Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values.

Sample Run
Enter Temperature: 27.6
Enter Temperature: 29.5
Enter Temperature: 35
Enter Temperature: 45.5
Enter Temperature: 54
Enter Temperature: 64.4
Enter Temperature: 69
Enter Temperature: 68
Enter Temperature: 61.3
Enter Temperature: 50
Sum = 504.3

Answers

i = 0

total = 0

while i < 10:

   temp = float(input("Enter Temperature: "))

   total += temp

   i += 1

print("Sum: {}".format(total))

I wrote my code in python 3.8. I hope this helps!

The program accepts 10 temperature inputs from the user, and takes the sum of the inputs gives before displaying the total sum of the temperature. The program is written in python 3 ;

temp_count = 0

#initialize the number of temperature inputs given by the user and assign to temp_count variable

sum = 0

#initialize the sum of the temperature inputs given

while(temp_count < 10):

#loop allows 10 inputs from the user

values = eval(input('Enter temperature : '))

#prompts user to input temperature values

sum+= values

#adds the inputted values to sum

temp_count+=1

#increases count of input by 1

print('sum of temperature : ', sum)

#displays the total sum

Learn more :https://brainly.com/question/18253379

Nathaniel wanted to buy a microphone. He went to an electronics store and was told that there are actually two types of microphones that he can choose from. What are the two types of microphones that Nathaniel can choose from?
Nathaniel can choose either of two types of microphone: dynamic or ____ .

Answers

Answer:

Condenser Microphone

Explanation:

google

Feel free to make me brainlyest!

Answer: condenser

Explanation:

i took the test and got it correct

9.2.2: Output formatting: Printing a maximum number of digits. Write a single statement that prints outsideTemperature with 4 digits. End with newline. Sample output with input 103.45632: 103.5

Answers

Answer:

The single print statement that does the required in python is:

print("%.4g" % outsideTemperature)

Explanation:

The full program is as follows:

The first line prompts user for input

outsideTemperature = float(input("Outside Temperature: "))

To print significant figures, we make use of g formats. And this is implemented as follows:

print("%.4g" % outsideTemperature)

The above prints 4 significant digits of outsideTemperature

For other significant figures, simply change the 4 to another number

Shelly recorded an audio composition for her presentation. Arrange the following steps that Shelly followed in the proper order.

She added effects to her audio composition.
She saved her audio composition on an optical drive.
She connected her microphone to her computer.
She saved the audio composition in an appropriate file format.
She selected the record option in her DAW.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Shelly recorded an audio composition for her presentation. She needs to follow the following proper orders to get composition done for her presentation.

She connected her microphone to her computer.She selected the record option in her DAW.She added effects to her audio composition.She saved the audio composition in an appropriate file format.She saved her audio composition on an optical drive.

Answer:

She connected her microphone to her computer.

She selected the record option in her DAW.

She added effects to her audio composition.

She saved the audio composition in an appropriate file format.

She saved her audio composition on an optical drive.

what is the art of prolonging the life of the food items that are available​

Answers

Answer:

Food preservation.

Explanation:

Food preservation can be defined as an art that typically deals with the process of preventing food spoilage by reducing or mitigating the growth of microorganisms and other external factors while maintaining the nutritional value, flavor and texture of the food.

Some of the factors that causes food spoilage include microorganisms (bacteria, yeast and molds), temperature, moisture content, oxidation etc.

Hence, food preservation is the art of prolonging the life of the food items that are available.

Basically, there are physical, chemical and biological methods which can be used to prolong the life of food items and thus sustaining the edibility and nutritional value of foods. These methods are;

1. Freezing.

2. Pasteurization.

3. Drying.

4. Retorting.

5. Thermal sterilization.

6. Fermentation.

7. Irradiation.

Given a binary search tree containing N integers, create an AVL tree containing the same values. You should not destroy the original BST in the process. What is the worst case time?

Answers

Answer:

answer : 0 (n log n )

Explanation:

Creating an AVL tree containing the same values and containing N integers and without destroying the original BST in the process, the worst case time will be : 0 ( n log n ) and this is because each insertion will take 0 (log n ) time

The worst case time for a binary search algorithm that contain N integers without destroying the original binary search tree (BST) is [tex]0(NlogN)[/tex]

What is a binary search?

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element from a sorted list of data, especially by using the run-time complexity of [tex]0(logN)[/tex].

Note: N is the total number of elements contained in a list.

In this scenario, the worst case time for this binary search algorithm that contain N integers without destroying the original binary search tree (BST) is given by [tex]0(NlogN)[/tex]

Read more on binary search here: https://brainly.com/question/24268720

describe at least five ways in which information technology can help studying subjects other than computing​

Answers

Answer:

I'd that IT can help in a great many different fields like

Mathematics, in a manner of solving complex math equations

Statistics, in a manner of creating complex graphs with millions of points

Modeling, in a manner of creating models from scratch, either for cars, personal projects or characters for video games and entertainment

Advertising, in a manner of using IT to create not only the advertisements themselves but also, spreading that advertisement to millions in a single click

Music/Audio, in a manner of creating new sounds and music that wouldn't be able to work in any practical manner

Explanation:

what do we use HTTP and HTML for?

Answers

HTTP is protocol while HTML is a language

HTML is a Language while HTTP is a Protocol.

HTML tags are used to help render web pages. The Hypertext Mark-up Language (or HTML) is the language used to create documents for the World Wide Web.

HTTP (Hypertext Transfer Protocol) is a protocol for transferring the hypertext pages from Web Server to Web Browser. HTTP is a generic and stateless protocol which can be used for other purposes as well using extensions of its request methods, error codes, and headers. Basically, HTTP is a TCP/IP based communication protocol, that is used to deliver data (HTML files, image files, query results, etc.) on the World Wide Web.

4. Word Separator:Write a program that accepts as input a sentence in which all of thewords are run together but the first character of each word is uppercase. Convert the sentence to a string in which the words are separated by spaces and only the first word starts with an uppercase letter. For example the string “StopAndSmellTheRoses.” would be converted to “Stop and smell the roses.”
*python coding

Answers

sent = input("")

count = 0

new_sent = ""

for i in sent:

   if count == 0:

       new_sent += i

       count += 1

   else:

       if i.isupper():

           new_sent += " "+i.lower()

       else:

           new_sent += i

print(new_sent)

The above code works if the user enters the sentence.

def func(sentence):

   count = 0

   new_sent = ""

   for i in sentence:

       if count == 0:

           new_sent += i

           count += 1

       else:

           if i.isupper():

               new_sent += " " + i.lower()

           else:

               new_sent += i

   return new_sent

print(func("StopAndSmellTheRoses."))

The above code works if the sentence is entered via a function.

Where should citations be included in your research paper? Select all that apply.
In the header
At the end of every paragraph
As footnotes
In a separate Works Cited page

Answers

Answer:

it would be the first one because it's the header and that's what applies

who plays a role in the finanical activites of a company

Answers

Financial managers are responsible for the financial health of an organization. They produce financial reports, direct investment activities, and develop strategies and plans for the long-term financial goals of their organization.

Write an application that counts the total number of spaces contained in a quote entered by the user.

Answers

Answer:

Explanation:

The following code is written in Java. It asks the user for an input and saves it in a String variable. Then it loops through all the characters in the string and counts the spaces. Finally, it prints the total number of spaces in the String.

public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Line Now:");

       String userInput = in.nextLine();

       int spaceCount = 0;

       for (int x = 0; x < userInput.length(); x++) {

           if (userInput.charAt(x) == ' ') {

               spaceCount++;

           }

       }

       System.out.println(spaceCount);

   }

You are adding more features to a linear regression model and hope they will improve your model. If you add an important feature, the model may result in.
1. Increase in R-square
2. Decrease in R-square
A) Only 1 is correct
B) Only 2 is correct
C) Either 1 or 2
D) None of these

Answers

Answer:

The answer is "Option A".

Explanation:

Add extra functionality, otherwise, it increases the R-square value, which is defined in the following points:      

To incorporate essential elements, R-square is explicitly promoted. It Increases the R-square value, which is an additional feature. It removes the features, which provide the value of the reduce R-square. After incorporating the additional features is used as the model, which is R-square, which is never reduced.

What are some applications of a Router?

Answers

Applications of Routers. Routers are the building blocks of Telecom service providers. They are used for connecting core hardware equipment such as MGW, BSC, SGSN, IN and other servers to remote location network. Thus work as a backbone of Mobile operations.

A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.a. Intrusion prevention system b. intrusion detection system c. defense-in-depth strategy d. quantitative risk assessment

Answers

Answer:b. intrusion detection system

Explanation:

An intrusion detection system (IDS)  helps to  alert  service administrators   to detect suspicious or malicious activity  by monitoring and analyzing  specific patterns to network traffic. Most times, the IDS may be configured  to  respond to suspicious malicious traffic by  blocking the cyber attacker making  such IP address unable to access that particular  network.

An intrusion detection system (IDS)  can be either a Host Based Intrusion Detection Systems (HIDS) or a Network Based Intrusion Detection Systems (NIDS) depending on preference by the user.

It is therefore necessary for  businesses who require high level of security   to adopt good and effective  intrusion detection systems so  that the communication of information from businesses to businesses  can be safeguarded and secure from cyber attacks.

Write a function named power that accepts two parameters containing integer values (x and n, in that order) and recursively calculates and returns the value of x to the nth power.

Answers

Answer:

Following are the code to the given question:

int power(int x, int n)//defining a method power that accepts two integer parameters

{

if (n == 0)//defining if block to check n equal to 0

{

return 1; //return value 1

}

else//defining else block

{

x = x * power(x, --n); //use x variable to call method recursively

}

return x; //return x value

}

Explanation:

In the above-given code, a method power is defined that accepts two integer variable in its parameter, in the method a conditional statement is used which can be defined as follows:

In the if block, it checks "n" value, which is equal to 0. if the condition is true it will return value 1.In the else block, an integer variable x is defined that calls the method recursively and return x value.

Which line of code in this program is MOST likely to result in an error

Answers

Answer:

What are the choices?

Explanation:

Answer:

line 2 it needs quotation marks :D

Explanation:

An uniterruptible power supply

Answers

Answer:

An uninterruptible power supply  is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails.

Explanation:

Your welcome :) PLZ mark brainliest

1. What do you think of the use of Moore’s Law to hypothesize a timeframe for the origin of life?
2. How does Moore’s Law apply to the efficiency of algorithms as we discussed in the last class?
3. Where do you think computers will be in 10 years? 100?

Answers

Answer:

1. I think it was actually a very good idea. As time goes on technology is improved, new laws and theories are proven, scientists are disproven, and efficiency of doing certain tasks evolves. Another reason would be, why not? It does not hurt to make a hypothesis or try a new approach.  

1. We spend countless time exploring and digging only to possible never find what we need to exactly pin the first life forms on Earth and when they lived, why not try a new different angle. So, I think that it was a very clever and interesting to use and Moore's Law to hypothesis the origin of life.  

2. Moore's law applies to the efficiency of algorithms because he came up with a way to hypothesis were in technology we should stand after a certain amount of time and how much improvements should be integrated into our computers.

2. Moore’s Law applies to the efficiency of algorithms because Moore created a exponential equation and graph of a hypothesis proven to help guide engineers on a steady path of improvement should be made to  computer processors and components with in a certain amount of time.

3. In a 10 years I think computers would have only made simply yet very effective and efficient improvements. Like longer battery life, or faster speeds, but virus firewalls and defenders. But when faced with 100 years I think that would have lead to a huge drastic change to what the normal idea of a computer is. It would be so high tech to us but with the world our grandkids are living in it'll be normal to have holographic computers.

3. I think that in 10 years computers would have improved much like they have recently, smaller, more compact, faster, and longer lasting, but within 100 years we would have a another invention entirely. Computers would have changed so much more than we could have every thought.

Explanation: I put a few different answers for each question so you can mix and match and use what's easiest for you but both are correct.

server.
10. The Domain Name refers to the
a) Mail
b) Google
c) Internet
d) Local

Answers

Answer:

C.

Explanation:

What term refers to a sequence of statements in a language that both humans and computers can understand?

a
hexadecimal
b
program
c
binary
d
macro

Answers

Answer your answer is Macro

Explanation:

Macro shares language both the computer and the programmer can undestand.

Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
Explain how commit works in a multi-transaction / multi-system function and what would need to be in place for a rollback to be successful.
Explain how buffering of data achieves a more efficient way to do I/O. Why is it important to add buffering to I/O?
What is the difference between blocking calls and non-blocking calls? Explain 2 methods to remove blocking from your application.

Answers

Answer:

integrgrg

Explanation:

integrety or not iim not

Non-blocking code does not prevent execution from continuing while blocking code prevents execution from continuing until the operation is complete. Blocking calls hold off on returning until the I/O operation is finished. Synchronous results are returned from it.

What is the difference between blocking calls and non-blocking calls?

Blocking calls hold off on returning until the I/O operation is finished. Synchronous results are returned from it. During the waiting period, nothing else in that process happens. In contrast, a non-blocking call uses a different method to check for completion and returns right away without any results.

Non-blocking code does not prevent execution from continuing while blocking code prevents execution from continuing until the operation is complete. Blocking occurs when subsequent JavaScript in the Node. js process needs to wait until a non-JavaScript activity is finished, according to the documentation for the language.

A program that is non-blocking does not prevent the execution of subsequent operations. Non-blocking techniques run in an asynchronous fashion. Asynchronously refers to the possibility that the program may not always run line by line.

To learn more about blocking and non-blocking calls refer to:

https://brainly.com/question/14286067

#SPJ2

C++ Code Outputs.

I have a problem with my code and I don't know how to make it run as the project that I need below.

This is my code:

#include

#include

#include

#include

using namespace std;

struct courseInfo{

string name;

int unit;

char grade;

};

struct Student {

string fName;

string lName;

string idNumber;

courseInfo courses[2];

int unitCompleted;

double gpa;

};

Student s;

bool openFile(ifstream &in);

void Print_info_one(Student s);

void Read_info(Student &s);

float Find_points(char c) ;

bool openFile(ifstream &inFile){

string line;

int i=0,k=0;

string fName="", lname="", id="", name1="", name2="";

char grade1, grade2;

int unit1, unit2;

if (inFile.is_open())

{

while (getline(inFile, line))

{

while (line[i] != ',')

{

fName += line[i];

i++;

}

i++;

i++;

while (line[i] != ' ')

{

lname += line[i];

i++;

}

i++;i++;

while (line[i] != ' ')

{

id += line[i];

i++;

}

i++;

int count=0;

while (count <2)

{

name1 += line[i];

i++;

if(line[i] == ' ' ) count++;

}

i++;

grade1 = line[i];

i++;i++;

unit1 = line[i]-'0';

i++;i++;

count=0;

while (count <2)

{

name2 += line[i];

i++;

if(line[i] == ' ' ) count++;

}

i++;

grade2 = line[i];

i++;i++;

unit2 = line[i]-'0';

}

inFile.close();

s.fName = fName;

s.lName = lname;

s.idNumber = id;

s.courses[0].name = name1;

s.courses[0].grade = grade1;

s.courses[0].unit = unit1;

s.courses[1].name = name2;

s.courses[1].grade = grade2;

s.courses[1].unit = unit2;

s.unitCompleted = unit1 + unit2;

s.gpa = (unit1*Find_points(grade1) + unit2*Find_points(grade2))/(unit1+unit2);

}

else

{

cout << "Error reading file\n";

return false;

}

return true;

}

void Print_info_one(Student s){

cout << "Name: " << s.fName << ", " << s.lName << " ID Number: " << s.idNumber << " Course 1 Name: " << s.courses[0].name << " Grade: "

<< s.courses[0].grade << " Units: " << s.courses[0].unit << " Course 2 Name: " << s.courses[1].name << " Grade: "

<< s.courses[1].grade << " Units: " << s.courses[1].unit << " Unit completed: " << s.unitCompleted << " GPA:" << s.gpa << endl;

}

void Read_info(Student &s){

}

float Find_points(char grade){

switch (grade)

{

case 'A':

return 4.0;

break;

case 'B':

return 3.0;

break;

case 'C':

return 2.0;

break;

case 'D':

return 1.0;

break;

case 'F':

return 0;

break;

default:

break;

}

return 0;

}

int main() {

ifstream inFile;

std::fstream fs;

fs.open ("input.txt", std::fstream::in );

Print_info_one(s);

return 0;

}
In the screenshots i'm showing the inputs and outputs that I need for the test

Answers

Answer:

#include

#include

#include

#include

using namespace std;

struct courseInfo{

string name;

int unit;

char grade;

};

struct Student {

string fName;

string lName;

string idNumber;

courseInfo courses[2];

int unitCompleted;

double gpa;

};

Student s;

bool openFile(ifstream &in);

void Print_info_one(Student s);

void Read_info(Student &s);

float Find_points(char c) ;

bool openFile(ifstream &inFile){

string line;

int i=0,k=0;

string fName="", lname="", id="", name1="", name2="";

char grade1, grade2;

int unit1, unit2;

if (inFile.is_open())

{

while (getline(inFile, line))

{

while (line[i] != ',')

{

fName += line[i];

i++;

}

i++;

i++;

while (line[i] != ' ')

{

lname += line[i];

i++;

}

i++;i++;

while (line[i] != ' ')

{

id += line[i];

i++;

}

i++;

int count=0;

while (count <2)

{

name1 += line[i];

i++;

if(line[i] == ' ' ) count++;

}

i++;

grade1 = line[i];

i++;i++;

unit1 = line[i]-'0';

i++;i++;

count=0;

while (count <2)

{

name2 += line[i];

i++;

if(line[i] == ' ' ) count++;

}

i++;

grade2 = line[i];

i++;i++;

unit2 = line[i]-'0';

}

inFile.close();

s.fName = fName;

s.lName = lname;

s.idNumber = id;

s.courses[0].name = name1;

s.courses[0].grade = grade1;

s.courses[0].unit = unit1;

s.courses[1].name = name2;

s.courses[1].grade = grade2;

s.courses[1].unit = unit2;

s.unitCompleted = unit1 + unit2;

s.gpa = (unit1*Find_points(grade1) + unit2*Find_points(grade2))/(unit1+unit2);

}

else

{

cout << "Error reading file\n";

return false;

}

return true;

}

void Print_info_one(Student s){

cout << "Name: " << s.fName << ", " << s.lName << " ID Number: " << s.idNumber << " Course 1 Name: " << s.courses[0].name << " Grade: "

<< s.courses[0].grade << " Units: " << s.courses[0].unit << " Course 2 Name: " << s.courses[1].name << " Grade: "

<< s.courses[1].grade << " Units: " << s.courses[1].unit << " Unit completed: " << s.unitCompleted << " GPA:" << s.gpa << endl;

}

void Read_info(Student &s){

}

float Find_points(char grade){

switch (grade)

{

case 'A':

return 4.0;

break;

case 'B':

return 3.0;

break;

case 'C':

return 2.0;

break;

case 'D':

return 1.0;

break;

case 'F':

return 0;

break;

default:

break;

}

return 0;

}

int main() {

ifstream inFile;

std::fstream fs;

fs.open ("input.txt", std::fstream::in );

Print_info_one(s);

return 0;

Explanation:

Which Packet Tracer feature do you think will be most helpful for you in learning how to manage a network

Answers

Answer:

Its ability to sniff and analyze packets in a network.

Explanation:

Network administrators require advanced skills and tools to manage a large network, to analyze packets as they are transmitted across the network.

Packet tracer helps to monitor the network connection and packet transfer. It informs the administrator of a dropped connection, slow transmission due to a bottle-neck, and many more packet related issues

Write a function named findmax()that finds and displays the maximum values in a two dimensional array of integers. The array should be declared as a 10 row by 15 column array of integers in main()and populated with random numbers between 0 and 100.

Answers

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

    Random r = new Random();

    int[][] numbers = new int[10][15];

   

    for (int i=0; i<10; i++){

        for (int j=0; j<15; j++){

            numbers[i][j] = new Random().nextInt(101);

        }

    }

   

    for (int i=0; i<10; i++){

        for (int j=0; j<15; j++){

            System.out.print(numbers[i][j] + " ");

        }

        System.out.println();

    }

   

    findmax(numbers);

}

public static void findmax(int[][] numbers){

    int max = numbers[0][0];

   

    for (int i=0; i<10; i++){

        for (int j=0; j<15; j++){

            if(numbers[i][j] > max)

                max = numbers[i][j];

        }

    }

    System.out.println("The max is " + max);

}

}

Explanation:

*The code is in Java.

Create a function called findmax() that takes one parameter, numbers array

Inside the function:

Initialize the max as first number in the array

Create a nested for loop that iterates through the array. Inside the second for loop, check if a number is greater than the max. If it is set it as the new max

When the loop is done, print the max

Inside the main:

Initialize a 2D array called numbers

Create a nested for loop that sets the random numbers to the numbers array. Note that to generate random integers, nextInt() function in the Random class is used

Create another nested for loop that displays the content of the numbers array

Call the findmax() function passing the numbers array as a parameter

A DVD-ROM can store more data than a CD-ROM of the same size. Comment.

Answers

Answer:

ya its true that DVD-ROM can store more data except CD-ROM

Explanation:

more dat saving in with DVD-ROM

how can i fix my code so that a teepee is properly formed? here is what i currently have (my output is uploaded as an image):

public static void teepee(int a){
for(int i=a; i>0; i--){
for(int j=a; j>0; j--){
System.out.print(" ");
}
System.out.print("/");
for(int k=i; k System.out.print(" ");
}
System.out.println("\\");
}
}

Answers

We are not sending them any other one tryin was there to a point that they had been doing the work for the first
Other Questions
overheating of an enzyme means the enzyme has lost its ___ (15pts) which word best describes heras garden x-2y = 32x + y = 11What is the value of x The heat of fusion of a metal is 7.62 J/g at its freezing point of 592F. How much energy is required to melt 257 g of this metal (already in 592F)? Please help me with this question its due tonight what was the most important discovery after columbus discovering the new world What is the slope of the line that passes through the points (-8, 3) and (-8, 5)? Leo's biological sex is male, and he is exploring which gender he considers himself. Leo's sexual attraction is not strong towards males or females.Which best describes Leo?homosexualquestioningbisexualtransgender In the context of website navigation, what is a node? In paragraph 2, what are two reasons he gives for not celebrating July 4th? Which of the following cells have a nucleus? - Animal cell- Bacteria cell- Plant cellWhich of the following cells have a cell wall?-animal cell- bacteria cell - plant cell Which part of this excerpt from Robert Louis Stevenson's Treasure Island best shows that the narrator was not pleased with the new look of theAdmiral Benbow Inn?The next morning he and I set out on foot for the Admiral Benbow, and there I found my mother in good health and spirits. The captain, whohad so long been a cause of so much discomfort, was gone where the wicked cease from troubling. The squire had had everything repaired, andthe public rooms and the sign repainted, and had added some furniture --above all a beautiful armchair for mother in the bar. He had foundher a boy as an apprentice also so that she should not want help while I was gone.It was on seeing that boy that I understood, for the first time, my situation. I had thought up to that moment of the adventures before me, not atall of the home that I was leaving; and now, at sight of this clumsy stranger, who was to stay here in my place beside my mother, I had my firstattack of tears. I am afraid I led that boy a dog's life, for as he was new to the work, I had a hundred opportunities of setting him right andputting him down, and I was not slow to profit by them.The night passed, and the next day, after dinner, Redruth and I were afoot again and on the road. I said good-bye to Mother and the cove whereI had lived since I was born, and the dear old Admiral Benbow-since he was repainted, no longer quite so dear. One of my last thoughts was ofthe captain, who had so often strode along the beach with his cocked hat, his sabre-cut cheek, and his old brass telescope. Next moment we hadturned the corner and my home was out of sight. Help me please!?!?!?!????? Think about what youve learned about inventions in the 1920s, and choose the best answer to complete each sentence.During the 1920s, the number of available entertainment options .Technologies such as cars and radios became affordable. Suppose a cell is placed in a large container of water with a very low solute concentration. What do you think would happen? PLEASE HELP Complete the following sentences with the logical answers or statements. This is an oral assignment; pay attention to the pronunciation.11. Est-ce qu'il y a un crayon dans ton sac? (Use the negative form)Non,_________.12.____________? (Use inversion.)Non, il n'y a pas de livre dans le sac.What do the following people like (or not like)?13. Louise is afraid of heights. Elle_________. (Use the negative form and logical sport.)14. Marc aime Chopin et Beethoven. Il__________. (Use the logical verb and type of music.)15. Il aime Louis Armstrong et Nina Simone. Il_________. (Use the logical verb and type of music.)16. Marie and Paul like skating a lot. Ils_________.17. Paul likes snow a lot. Il__________. (Use the logical verb and type of sport.)18. Tu aimes le tennis?Non,___________. (Use the negative form.)19. Sophie likes windsurfing a lot. Elle________.20. Marc aime la nature et la marche pied. Il________. 1. If 15% of adults in a certain country work from home, what is the probability that fewer than 42 out of a random sample of 350 adults will work from home? (Round your answer to 3 decimal places) 2. Suppose we want to estimate the proportion of teenagers (aged 13-18) who are lactose intolerant. If we want to estimate this proportion to within 4% at the 95% confidence level, how many randomly selected teenagers must we survey? This is only 5 points but can someone please go answer my last asked question?You don't have to answer the questions, but you can.Its 50 points and I want to mark the guy who answered it brainliest, thank you! The Twenty-second Amendment was passed in response to which event? On dois manger des lgumes tous les jours.-doit-devoir-devons-No change is necessary