What coding scheme is used by most microcomputers?

Answers

Answer 1
The answer to your question is ISYS

Related Questions

The default dfs namespace mode is windows server 2008, which supports up to 50,000 folders. how many folders does using non-windows server 2008 provide?

Answers

35 millions folders windows servers

a. True
b. False: the arguments in a module call and the parameters listed in the module header must be of compatible data types.

Answers

True ? They have to be of the same type, comatible isn't absolute enough. But I may be overthinking it.

_____ rows indicate that there is different formatting for odd and even rows.

Answers

Banded rows indicate that there are different formatting for odd and even rows.

Which type of encryption is the most popular form of e-mail encryption?

Answers

Public Key Cryptography is the most popular form of encryption in emails. This type of encryption utilizes "keys" only known to the owner of the set of data. 

In the dns naming convention, what character(s) separate(s) a domain name from its subdomains?

Answers

In the dns naming convention, the domain name separates the sub-domains by "DOT" (.) character.

DNS or Domain Name System is written in a conventional method as Host. Domain. Root. This system allows only 255 characters while naming a domain that also includes the spaces in between. Sub-domain is the part of a large domain.

In normal view, powerpoint's ________ contains buttons such as notes, comments, and view.

Answers

In normal view, powerpoint's status bar contains buttons such as notes, comments, and view. Status bar is located at the bottom of the PowerPoint application window, and it is needed to show both all the information about the document and user's ability to change the settings of a presentation. Status bar includes such specific items as : zoom control, slide number, comments and note pane buttons and view control.

A team wants to set up a computer lab for their library. Members would be able to access and read books using the computers in the library. After researching about risks, they decide to install only desktop computers instead of tablets. This strategy might prevent the risk of computers being stolen. Which risk management technique are they following?

A.) risk acceptance
B.) risk mitigation
C.) risk avoidance
D.) risk transfer

Answers

C . Risk avoidance
they don't want anyone to steal their stuff so they get their desktops to avoid anything getting stolen

Which type of attack attempts to overwhelm network links and devices with useless data?

Answers

A DDoS attack is a type of network attack that overwhelms a network with pointless data to the point that normal users can't get access to basic functions. This was notably done to The Playstation Network several years ago.
Final answer:

A Distributed Denial of Service (DDoS) attack attempts to overwhelm network links and devices with useless data.

Explanation:

The type of attack that attempts to overwhelm network links and devices with useless data is called a Distributed Denial of Service (DDoS) attack.

In DDoS attacks, hackers flood a target network or website with an enormous amount of traffic, making it unable to handle legitimate requests. This is achieved by using a network of compromised computers called a botnet to send the malicious traffic.

For example, hackers might use a DDoS attack to target an online shopping website during a busy holiday season, causing the site to slow down or even crash, preventing customers from accessing the site.

You try to enter your name into a cell that accepts a numeric value. What error would you receive

Answers

A. #NAME

B. #VALUE

C. #REF

D. #####

E. #DIV


#VALUE on plato

your answer is B. #VALUE

Which of the following lines of distribution best describes the diagram?

A: retail distribution
B: direct distribution
C: distribution by agents or brokers
D: wholesale distribution

Answers

A) retail distribution.

Answer

retail distribution

Explanation

Retail distribution is the process or path that a manufactured good takes to reach its intended consumer. Manufacturers employ different retail distribution strategies for the purposes of interacting with customers.Sometimes the distribution channel is direct, such as when a consumer purchases a product directly from company without involving any intermediary.

You need to upgrade memory in a system but you don't have the motherboard documentation available. you open the case and notice that the board has four dimm slots

Answers

The three yellow slots probably indicate triple channeling, which means the board uses DDR3 DIMMs. To know for sure, remove a DIMM and look for the position of the notch on the DIMM.

Why is the definition for second based on the Cesium 133 atom?

Answers

It is qualitatively defined as the second division of the hour by sixty, the first division by sixty being the minute. The SI definition of second is "the duration of 9 192 631 770 periods of the radiation corresponding to the transition between the two hyperfine levels of the ground state of the caesium 133 atom".

The android operating system is used by many popular tablet computers. which tablet does not use the android operating system

Answers

Apple Ipad and Microsoft Tablets.

Mike accidentally wrote a check for more than the balance in his checking account. The bank transferred money from his savings account to his checking account to cover the check. This banking service is _____.

Answers

Transfer. His back transfers money from one account to another.

Answer: The correct answer is overdraft protection.

Explanation: The service that a bank offers when they transfer money from the savings account to a checking account to cover an overdraft is called overdraft protection. Some banks may charge for this service, but others do it for free.

What is the name of a coding scheme that assigns a specific numeric code to each character on your keyboard?

Answers

python is the answer to your question

Software that instructs the computer how to run applications and controls the display/keyboard is known as the /7367008/81dc7fcb?utm_source=registration

Answers

The answer is the alu arithmetic logic unit. (:

A touch screen is classified as a special type of scanning device true or false

Answers

The anwser is true. It is special type


A touch screen is a device that can be sued for making scree-related touches and is as it touch sensitive and measures the responses from the touches. It is a type of scanning device that is stylus uses the pressure and is used to make images on the screen.

Hence the option is false as the touch screen is not classified as a true scanner it don't scan and is only a touch-sensitive element.

Hence the option False.

Learn more about the classified as a special type of.

brainly.com/question/19636949.

The term "net radiation" refers to _____ the total amount of energy received by earth. the total amount of energy radiated by earth. the difference in amount of incoming and outgoing radiation. radiation emitted by satellite networks.

Answers


The term "net radiation" refers to the difference in amount of incoming and outgoing radiation the total amount of energy received by earth.

Energy comes from the sunlight penetrates the top of the atmosphere- that's the incoming energy. Then some of it is lost by reflection of clouds or the Earth's surface, thermal radiation- that's the outgoing energy.

A(n) ________ variable is declared inside a module and cannot be accessed by statements that are outside the module.

Answers

local






----------------------------------------------------

If using the md5 hashing algorithm, what is the length to which each message is padded?
a. 32 bits
b. 64 bits
c. 128 bits
d. 512 bits

Answers

If using the MD5 hashing algorithm, the length to which each message is padded 512 bits.

Answer: (d.) 512 bits.

MD5 stands for Message Digest 5. It is a hashing algorithm that is case sensitive.  It is a cryptographic hash values.

I plugged my phone up into a charger, the charger sparked and i unplugged my phone and now it wont charge at all, does anyone know what is wrong or how much it would be to fix it?

Answers

The most probable answer is that their was a short on the charger causing your phone's charging port to blow out. You can fix this yourself with a hot air soldering gun to remove the charging port and replace it with an identical port but it is not recommended if you have a warranty. As for prices it depends on the phone.

Write a program that will take an integer and add up each of the number’s digits, count the number of digits in the number, and then average the digits. You must use a while loop and % to access each of the individual digits. Use / to reduce the number so that you can average all of the digits.
Example: num = 123 can be taken apart with tempNum = 123 % 10 (which will pull off the 3), then tempNum = tempNum / 10 (will result in 12). Do this in a loop while the number is > 0.

Sample Data :
234
10000
111
9005
84645
8547
123456789


 Be sure to include print statements that will format the output as below.

Sample Output :
234 has a digit average of 3.0

10000 has a digit average of 0.2

111 has a digit average of 1.0

9005 has a digit average of 3.5

84645 has a digit average of 5.4

8547 has a digit average of 6.0

123456789 has a digit average of 5.0

Answers

For count digits, you could just convert it to a String and check the length
Sum digits, convert to string then seperate each character with charAt then convert it to numbers in the return statement.
Average digits you can convert it to a String and then convert them back after taking them apart.
Here is my solution:

import java.lang.System.*;

public class DigiMath {   

private static int countDigits(int number)
{
       int sum = 0;
       while(number > 0)
       {
           sum ++;
           number /= 10;
       }       return sum;   
}

private static int sumDigits(int number)   
{       
      int sum = 0;       
      while(number > 0) {
           sum += number % 10;
           number /= 10;
       }
       return sum;
}
   
   public static double averageDigits( int number )
   {
       int count = countDigits(number);
       if (count > 0) {
           return (double)sumDigits(number) / (double)count;      
       } else { 
            return 0; 
       } 
   }
   
   public static void PrintDigitAverage(int number)
   {
       System.out.printf("%d has a digit average of %1.1f\n", number, averageDigits(number));
   }
   
   public static void main(String[] args) 
   {
       // Method tests (run with java -ea)
       assert countDigits(12345) == 5 : "countDigits returns wrong count";
       assert sumDigits(12345) == 15 : "sumDigits returns wrong sum";
       assert averageDigits(12345) == 3.0: "averageDigits returns wrong average";

        PrintDigitAverage(234);
        PrintDigitAverage(10000); 
        PrintDigitAverage(111); 
        PrintDigitAverage(9005); 
        PrintDigitAverage(84645); 
        PrintDigitAverage(8547); 
        PrintDigitAverage(123456789);
   }
}


The ____________ method can be used to convert a string to an int.

Answers

parseInt()





----------------------------

A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
A. 20 A.
B. 15 A.
C. 30 A.
D. 25 A.

Answers

i think it is 25 im not sure though

Answer:

A. 20 A.

Explanation:

The National Electrical Code (NEC) Table 310-16 states that unless there is another specific provision in this code, the overcurrent protection in relation to the conductor types that has an obelisk( ) mark shall not be greater than 15 amps for No. 14, 20 amps for No. 12, and 30 amps for No. 10 copper; or, in relation to aluminum and copper clad aluminum, it shall not be greater than 15 amps for No. 12 and 25 amps for No. 10 after factors for ambient temperature and number of conductors have been adjusted as necessary.

Therefore, a type TW cable containing two No. 12 copper conductors can not have more than 20 A (i.e. 20 amps) overcurrent protection.    

If a business wanted to play an artist’s song in the background of their website, it must first consider the _____ of the music to ensure no laws are being broken.

Answers

no copyright laws being broken. the answer is copy right.

Answer:

copyright

Explanation:

Copyright is the set of national and international legal principles and norms that protect the creation of intellectual works by human beings.

There are two traditional legal conceptions of intellectual property: disseminated in the area of ​​influence of Anglo-American law and copyright, prevailing in the area of ​​influence of Latin law. In addition, there is now another conception, of a universal nature, free licenses, which some call "copyleft". And there is also the public domain. The first two have their origin in the monopolies that the monarchs granted to the authors to stimulate intellectual creation, and coincide in protecting the rights of the authors by granting them the power to exclude all other people from the use of the works, except the simple and individual reading, visualization, listening.

If your role model is from the same neighborhood as you or has the same ethnic background, _____.

Answers

your role model probably faced some of the same challenges as you will face
during your career

which type of website would a business selling merchandise on the internet use? A person B information C commercial D social

Answers

I think it's C, commercial.

In addition to displaying subtotals, the subtotal feature "____" your worksheet so you can control the level of detail that is displayed.

Answers

In addition to displaying subtotals, the subtotal feature "outlines" your worksheet so you can control the level of detail that is displayed. The statement suggests that the displayed details levels are controlled in displaying subtotals in the subtotal feature table.

The last host address on the 10.15.25.0/24 network is

Answers

10.15.25.254 or 10.15.25.254/24
Final answer:

The last host address on the 10.15.25.0/24 network is 10.15.25.254. The /24 network provides 256 possible addresses, but the first and last addresses are reserved for network and broadcast addresses respectively.

Explanation:

In a /24 network, the last octet (8 bits) of the IP address is used for identifying hosts. The 10.15.25.0/24 network range offers 256 possible addresses, from 10.15.25.0 to 10.15.25.255. Among these, 10.15.25.0 is the network address and 10.15.25.255 is the broadcast address. Therefore, the last host address - the final usable IP address within this network - is 10.15.25.254.

Learn more about IP Address here:

https://brainly.com/question/35862697

#SPJ6

additional rows and columns are inserted into a table by using the _____ tab

Answers

insert tab
up at the top
have a nice day

Answer:

Layout

Explanation:

To add additional rows or columns, click anywhere in the table and click on the layout tab

To add rows ,click insert above or insert below.

To add columns click insert left or insert right.

Other Questions
The Populist Party got its start because of what event?the Civil Warthe Panic of 1893the Panic of 1873the Great Depression ____________________ 2. what kind of solution contains more hydrogen ions than hydroxide ions? established in the Colony of Virginia in 1619 consisted of a Governor, a council, and representatives from the colony marked the beginning of representative government in British North AmericaThese are all describing what colonial legislative body?A) the Plymouth Company B) the Mayflower Compact C) the House of Burgesses D) the Fundamental Orders Why was it difficult to make changes to the articles of confederation? an amendment required approval by all 13 states. the articles did not provide for amending the constitution. two thirds of the delegates had to agree in order to amend the articles. the states had to convene a special committee to revise the articles? Enter the value, as a mixed number in simplest form, in the box. |2 1/3| = ? The independent variable of a data set is s, while the dependent variable is t. Which of these is an explanatory variable?A. sB. tC. Both s and tD. neither s and t 10. One standard drink, which contains .6 ounces (14 grams) of alcohol, contains __________ Calories but no nutrients. A. 14 B. 28 C. 56 D. 97 String a is 35 centimeters long. String b is 5 times long as string a. Both are necessary to create a decorative bottle. Find the total length of string needed for 17 identical decorative bottles. The ____ condition requires that all of the selected criteria be true for the record to be displayed. Cul no es una de las caracterstica geogrficas de la Patagonia? a. ros c. grandes picos b. volcanes d. grandes acantilados the latin word porus means passage. how does this meaning relate to the pores of the skin 3.1+(0.35) Write your answer as a decimal. 23. The gerund phrase in the sentence below is used as a ___ Everyone enjoys watching a dolphin show. a. subject. b. direct object. c. predicate nominative. d. predicate adjective. Struggling with this one! Whom would you not address using the t form? a. a brother/sister c. a principal b. a classmate d. a cousin Please select the best answer from the choices provided A B C D Which sentence most clearly uses connotation to express a feeling of anger? A. Sarah gave Jenn a disapproving look when she stole her last french fry. B. Sarah frowned at Jenn when she stole her last french fry. C. Sarah glared icily at Jenn when she stole her last french fry. D. Sarah made a face at Jenn when she stole her last french fry. Project managers have the overall responsibility for planning, executing, and completing a project. A) True B) False Hector is competing in a 42 mile bicycle race, he has already completed 18 miles of the race ad is traveling at a constant speed of 12 miles per hour when Wanda starts the race. Wanda is traveling at a constant speed of 16 miles per hourFind the equation when Wanda will catch up to hector Which of the following is an example of biotechnology? a)satellite b)artificial heart c)atomic bomb d)silicon chip Read thesentence. Sitting in his highchair, the baby poked curiously at his food. Whatis the participial phrase, and which word does it modify? at his food; modifies poked in his highchair; modifies Sitting Sitting in his highchair; modifies baby poked curiously; modifies baby Which of the following are negative characteristics of political conventions? Select all that apply. 1.fraud 2.bribery 3.photojournalism 4.corruption