17. When an industrial electrical circuit requires a 220 VAC single phase power supply, the electric power supply circuit is normally taken from
O A. a separate transformer feed.
O B. a single phase of a three-phase system and a ground wire.
O C. two of the three power feeds in a three-phase system.
O D. phase A of a delta connected to the neutral tap on windings B and C.

Answers

Answer 1

The electric power supply circuit is normally taken from a single phase of a three-phase system and a ground wire.

What is the 220 single phase?

In this setting, that is in a single-phase connection, the flow of electricity is said to be via a single conductor but in a three-phase connection, it is made up of three separate conductors.

Therefore, Based on the above, The electric power supply circuit is normally taken from a single phase of a three-phase system and a ground wire.

Learn more about electrical circuit from

https://brainly.com/question/2969220

#SPJ1


Related Questions

Write code that does the following: opens the number_list.txt file, reads all of the numbers (1 to 100) from the file, adds all of the numbers read from the file and displays their total. then closes the file.

Answers

The code that does the following: opens the number_list.txt file, reads all of the numbers (1 to 100) from the file, adds all of the numbers read from the file and displays their total. then closes the file is given below.

What is the code  about?

Below is an example Python code that should accomplish this task:

python

# Open the file for reading

with open("number_list.txt", "r") as file:

   # Read all the lines and convert them to integers

   numbers = [int(line) for line in file.readlines()]

# Sum up the numbers and display the total

total = sum(numbers)

print("The total is:", total)

# Close the file

file.close()

Therefore, Assuming that the number_list.txt file contains one number per line from 1 to 100, the code should read all the numbers from the file, sum them up, and display the total. Finally, the file is closed automatically when the with block is exited.

Read more about code  here:

https://brainly.com/question/26134656

#SPJ1

Answer

Explanation:

I don't know

Create pseudocode to compute the volume of a sphere. Use the formula: V= (4/3)* π r3 where π is equal to 3.1416 approximately, where r is the radius. Display the result.

HELP PLZ

Answers

Answer:

In geometry, the area enclosed by a circle of radius r is πr2. Here the Greek letter π represents a constant, approximately equal to 3.14159, which is equal to the ratio of the circumference of any circle to its diameter.

Explanation:

Pseudocodes are simply false codes that are used as program prototype or models

The pseudocode

The pseudocodes to compute the sphere volume is as follows:

StartInput rCalculate Volume, V = (4/3) * 3.1416 * r^3Display Volume VStop

Read more about pseudocode at:

https://brainly.com/question/24953880

#SPJ9

You can find this out on Brainly! Recycling one glass jar saves enough energy to watch television for _ hours It's one of the fun facts!

Answers

Recycling one glass jar saves enough energy to watch television for 3 hours.

3! Is the answer ………..

Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers

Answers

Answer: D

Explanation: Hackers are the only type of cyber criminal that monitors your computer

it would be D the hackers

Does anybody know how to make sure if your computer has a virus or not? but without the cost of money?

Answers

Answer:

If your computer has a virus, then there could be two reasons why: a. if a tab/window keeps popping up after you closed it, or b. if your computer got hacked and it has a malfunction such as not being able to click in a certain area (believe me, I have expirienced one) those are just two major reasons and effects on your computer having a virus, but you should talk to a tech expert (like me) about what specific things are happening :)

Answer:

1. Install Anti-Virus/Malware Software.

2. Keep Your Anti-Virus Software Up to Date.

3. Run Regularly Scheduled Scans with Your Anti-Virus Software.

4. Keep Your Operating System Current.

5. Secure Your Network.

6. Think Before You Click.

7. Keep Your Personal Information Safe.

8. Don’t Use Open Wi-Fi.

9. Back Up Your Files.

10. Use Multiple Strong Passwords.

Hope this helps:)

How do the text feature help on the text?

Answers

Answer:

Text features help you locate important information in a text. Knowing the purpose of the text feature helps you decide at which text feature to look when you want to understand your text better. Organized by purpose, the chart identifies text features and how they help the reader.

Explanation:

Here is your answer
How do the text feature help on the text?

What are the different types of software? Give one example

Answers

microsoft, apple, acer
Application Software, System Software, Programming Software, Shareware, Open Source Software

How can the IOSP model help us to design an app that solves a problem?

Answers

Answer:

Definition. IOSP. Input Output Server Processor. IOSP. Integrative and Organ Systems Pharmacology (course; various locations)

Explanation:

The IOSP model describes a simple modeling platform which enables application development in a much easier and simple interface. It follows the pattern : input - > processing - > storage - > output.

The IOSP model takes in input which represents the variables and components needed to solve a particular problem. It is then processed, stored and output is generated.

Hence, the workflow allows the creation of an application which solves a problem.

Learn more :https://brainly.com/question/12191237

GUYS THERE IS A HACKER IN BRAINLY PLEASE DONT PRESS ON THE WEBSITE THEY WILL HACK YOU.

Answers

yeah ive seen them :( they are files and if you download them you will get a virus or your ip taken so please watch out !!

Answer:

Ok noted

Explanation:

Dell XPS 15 or MacBook pro 13?​

Answers

Answer:

MacBook Pro 13

Explanation:

Mostly cause of the brand.

And also I have a MacBook pro

Answer:

I think I would pick a MacBook Pro 13

Explanation:

The reason why is because personally I like apple products alot and Im not saying that Dell products are bad but I think apple products are just better. Also they do look the same but its really up to you to decide which brand you like better. If  you had more experince with one brand you might want to stick with it or if you have experinced with both brands you should decide which you liked better.

Please help I need some one that knows about the article Disney Imagineer because I wasn't in school today so please help me write 2 paragraphs about it please. Help this is due at 11:59 PM

Read the article (Disney Imagineer) in class and write 2 paragraphs.​

Answers

Answer:

I don't know much but I looked up some stuff about the Article.

River of the light-

When park-goers swarm Walt Disney World's Animal Kingdom later this month, Joe Rohde will be paying close attention.

The executive designer and vice president of Walt Disney Imagineering Creative has spent the last eight years overseeing the expansion of Disney's Animal Kingdom park, including its soon-to-be unveiled evening spectacle, "Rivers of Light." Rohde, a Disney veteran who said he started “at the bottom of the design ladder” in 1980, has also been leading the charge on Disney's "Avatar"-themed land, based on James Cameron's 2009 top-grossing film, which is slated to debut in 2017. The first of four planned sequels to Cameron's movie based on the fantastical world of Pandora will hit theaters a year later.

Rohde has overseen the development of Disney's "Avatar"-inspired land, seen in this illustration, which is scheduled to open at Animal Kingdom in 2017.-

Rohde likened the process of developing and constructing a major attraction to filming a major blockbuster film. The whole investment -- from "the morning of conceptualization to opening day" can take anywhere from four to five years, Rohde told ABC News. And in the case of Animal Kingdom, incorporating live animals can lead to other challenges.

"The inclusion of live animals changes design standards ... but it brings realism to design," he said in a phone interview. "Nature is a supreme, immutable value."

The millions of visitors who travel to Disney’s theme parks around the world -- more than 134 million in 2014, according to the Themed Entertainment Association (TEA), an industry trade group -- are not privy to the trials and tribulations of what it takes to bring an idea to fruition at Disney. Imagineers, as they're referred to at Disney, prefer it that way.

"We try to be invisible," Theron Skees, executive creative director for Walt Disney Imagineering, said in an interview.-

Skees started his Disney career painting artificial grottos and tunnels at Disneyland Paris' Pirates of the Caribbean attraction. Skees, who previously worked as a sculptor and set designer in film and commercials, has lived on three continents as a Disney imagineer, tasked with bringing the visions and interpretations of Disney characters and stories to life. The imagineering division, one of the most competitive and challenging practices within the Disney universe, has the sole responsibility of delivering "the magic" that visitors seek year after year. There are at least 1,500 imagineers currently in the company, according to a Disney spokesperson, with 140 disciplines within the group.

"There's the technical know-how, the creative vision, the planners and the operators," Skees said. "Imagineering is a pretty specialized group that requires a specialized mindset."-

And loners need not apply.

"You have to communicate and get an idea out there, whether that's painting, building or drawing models," Rohde added. "The ability to collaborate as a group is a must."

Skees reiterates that every imagineer is encouraged to submit ideas -- whether that’s for a new roller coaster, a live performance or costume design at one of the theme parks, hotels or Disney cruises.

“All ideas go through a process and it’s not exclusive to one person,” he noted.

Ideas can come from anywhere. Rohde immerses himself in books -- non-fiction, art history, neurology -- and vows to plow through the 35 stacked next to his bed, soon-to-be additions to his personal library of 5,000 books.

To be successful in this career “you need to find smart people to work under you and to read a lot,” he explained. Traveling the world? A necessity.

“We’re not making two-dimensional products. You need to know what places are really like,” he added.

Disney is the parent company of ABC News.

Hope you can get your work in on time.

Thank you for your answer!

Some problems are better solved by a computer and some are better solved by humans.

How do you know when a problem should be solved by a computer or by a person?

Answers

Answer:

I say when u don't know the answer completly.

If your not sure the answer, a computer can be a helpful source. I say if its a more technical problem leave it to the computers. If its a personal/emotional question answer yourself. hope this helps!

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

Choose an efficient method of saving electricity. Briefly present the advantages and disadvantages of applying the chosen method in everyday life.

Answers

One method of saving electricity that is both efficient and easy to implement in everyday life is using energy-efficient light bulbs.

Advantages:

Energy-efficient light bulbs use significantly less energy compared to traditional incandescent bulbs, resulting in lower electricity bills.

They have a much longer lifespan, which means they need to be replaced less frequently, leading to additional savings and reduced waste.

Energy-efficient light bulbs come in a variety of styles and colors, making it easy to find one that fits your needs and preferences.

Disadvantages:

Energy-efficient light bulbs can be more expensive to purchase initially compared to traditional incandescent bulbs.

Some energy-efficient light bulbs, such as compact fluorescent bulbs, contain small amounts of mercury, which can be harmful to the environment if not disposed of properly.

Energy-efficient light bulbs may not work with certain types of dimmer switches, so it's important to check compatibility before purchasing.

Overall, switching to energy-efficient light bulbs is a simple and effective way to save electricity and reduce your carbon footprint. While there may be some initial costs and limitations, the long-term benefits of reduced energy consumption and reduced waste make it a smart choice for those looking to be more environmentally conscious.

An efficient method of saving electricity is by using LED light bulbs instead of traditional incandescent or fluorescent bulbs. LED stands for Light Emitting Diode and they are designed to be highly energy-efficient.

Advantages of using LED light bulbs:

1. Energy Efficiency: LED bulbs consume significantly less energy compared to traditional bulbs. They convert a higher percentage of electrical energy into light and produce less heat as a byproduct, making them more efficient and cost-effective in the long run.

2. Long Lifespan: LED bulbs have a much longer lifespan than traditional bulbs. They can last up to 25 times longer, reducing the frequency of replacement and saving money on replacement costs.

3. Environmental Friendly: LED bulbs do not contain harmful substances like mercury, which is commonly found in fluorescent bulbs. By using LED bulbs, you can contribute to reducing hazardous waste in landfills.

4. Durability: LED bulbs are more durable and resistant to shocks, vibrations, and temperature changes compared to traditional bulbs. This makes them suitable for various environments, including outdoor lighting.

Disadvantages of using LED light bulbs:

1. Higher Initial Cost: LED bulbs are generally more expensive to purchase upfront compared to traditional bulbs. However, the cost is offset by their longer lifespan and lower energy consumption over time.

2. Limited Color Options: While LED bulbs offer a wide range of color options, the selection might not be as extensive as traditional bulbs. However, advancements in LED technology have expanded the available color choices.

3. Sensitivity to Temperature: Extreme temperatures can affect the performance of LED bulbs. In very cold temperatures, LED lights might take longer to reach their full brightness, and in very hot temperatures, their lifespan might be reduced.

Overall, using LED light bulbs is an efficient method of saving electricity due to their energy efficiency, long lifespan, environmental friendliness, and durability. Though they may have a higher initial cost and limited color options, these drawbacks are outweighed by the long-term benefits they provide. By adopting LED bulbs, individuals can contribute to energy conservation and reduce their electricity bills.

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

Be sure to answer the following in complete and detailed sentences.

1. What might be a benefit of wirelessly connecting smart devices in a physical computing project?
2. How might you connect more than two micro:bits to activate multiple outputs triggered by one micro:bit?
3. How do batteries and other types of power sources make physical computing systems more mobile? Why is that helpful?

Answers

Answer: 1, 3

Explanation:

1: It can not just cause less of a wire mess. It can also cause easy travel if you want to do something from somewhere else!

3: It can make it easier to power up a device quickly when you CAN replace the batteries. It can also make charging more efficient overall.

Answer:1: It can not just cause less of a wire mess. It can also cause easy travel if you want to do something from somewhere else!

3: It can make it easier to power up a device quickly when you CAN replace the batteries. It can also make charging more efficient overall.

Explanation:

How can you have a safe browsing experience?
Enable JavaScript in your web browser.


Select the option to delete cookies when you close the browser.


Click pop-up advertisements to download software.


Enable automatic download of software whenever the vendor offers a new update.


Disable automatic completion of username and passwords.

Answers

Answer: Disable automatic completion of username and passwords or  Select the option to delete cookies when you close the browser.

Explanation: The rest aren't safe. If it's a one choice go with Disable automatic completion of username and passwords

A or D but auto completion is probably what I would go with

A choice function will choose a value at random from a float.

A.
True

B.
False

Answers

A I took the test and got it right
Answer………………………….. A

If you created a variable called name, what data type would that value be? Group of answer choices a float a string a Boolean an integer

Answers

I think its an integer

Answer:

a float

Explanation:

What is an iteration or a sequence an example of?
variable
control structure
syntax
tool

Answers

i’m pretty sure that it is stynax
It’s synax but If im not correct it’s control structure

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

Jaime has been hired as a consultant for a company. His task is to help the company spend less time and money writing code. Jaime notices that, even for very complicated programs, the programmers at this company start programming without an overall plan for the development of the code. What might Jaime suggest that they do instead?

A.
begin by writing the final lines of the program instead of the first lines

B.
program in C++ instead of in Python

C.
begin by creating a pseudocode

D.
spend more time debugging

Answers

C. begin by creating a pseudocode Step-by-step solution: 1. The problem mentions that the programmers at the company start programming without an overall plan for the development of the code. 2. To address this issue, Jaime should suggest that they begin by creating a pseudocode. 3. Pseudocode is a high-level description of the program that uses natural language and basic programming structures to outline the logic and flow of the program. 4. Creating a pseudocode helps the programmers develop a plan for the overall structure of the code before they begin writing actual code. 5. This can save time and money in the long run by reducing the number of errors and bugs that need to be fixed. 6. Therefore, option C, "begin by creating a pseudocode," is the best suggestion that Jaime can provide to the company.

Answer:

C

Explanation:

i had to answer this question on a test and ended up getting it right, hope this helps!! :D

What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware

Answers

Answer:

Hardware

Explanation:

Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.

Hope this helps. <3

Hardware is the name given to the parts of a computer that you can actually touch.

What is Hardware?

The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware. 

Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.

Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.

Therefore, Hardware is the name given to the parts of a computer that you can actually touch.

To learn more about Hardware, refer to the link:

https://brainly.com/question/15232088

#SPJ5

Brent is an engineer who works in a nuclear plant. His job is to design the systems that help create nuclear energy and the systems that keep the plant safe. STEM pathway that John's job falls into is ____.
a) teaching and Training
b) Science and Mathematics
c) information support and services
d) Engineering and Technology
Which one? If you know the answer and tell me, I'll mark you Brainliest! Thank you!

Answers

Answer:

it is b

Explanation:

It is d. Because to engineer a power plant you need advanced technology

reasons phone doesnt charge

Answers

Here are 5 reasons possibly why:

1.) Faulty lightning or micro USB port

2.) The lightning or USB port could be dirty

3.) Damaged charging port or cable

4.) Water Damage

5.) Software problems

One example could be that the charging hole is full of dirt and dust.

I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form seeing their screen and tabs ?

Answers

Answer:

just don't share your screen in the class or if your a teacher just call them out

Explanation:

No they can’t stop it

What are the pros and cons of doing research for homework projects online over using offline resources like libraries?

Answers

Here is my answer






Pros: like you’re phone it could be portable and easy to use unlike a library you can’t take a while library with you like in your pocket



Con: the stuff you could be trying to find out could be wrong or there is millions of answers that are not all the same
Distractions are everywhere online although it’s quick and easy, but offline sources encourage reading and a variety of answers

These types of questions are why my moderator application was never accepted.

Answers

currently : stressing out cause of this school work
school and work makes me feel alive but i’m dead

Processor speeds are in bytes.

True
or
False

Answers

Answer:

true

Explanation:

Mainly true, but partly false. There are two bits in a computer that supply speed: The processor (measured in hertz eg. 2Ghz Processor) and RAM (bits and bytes eg 2GB of RAM). The processor is more to do with the speed programs run and load at, and RAM let's you use lots of memory intensive programs at the same time, although this also comes down to the processor and vice versa. Hope I helped :)

Answer:

false

Explanation:

processor speeds are in Gigahertz

Other Questions
s nhn s ca nh hng Theo: What does Martin Luther believe constitutes the true church? Which mountain range is on the western coast of the United States? Appalachian MountainsSmoky MountainsRocky MountainsMount Everest What are the 4 steps of naturalization? The order pair for the equation y =2x+3(-1----) What's 2|9| |2|? Question 14 options: A) 18 B) 20 C) 16 D) 20 We tend to _______ the competence of those in high status positions and _______ those who agreeably accept a lower status position. After taking several assessments and being told that all signs indicate he is perfect inevery way for a career as a high school teacher, Mike becomes a high school teacher.He is miserable. Why is Mike so miserable in a career that psychological assessmentsindicated he would be a perfect fit? The Wong family bought a $190,000 home in 2001. They obtained a mortgage loan for 30 years. The monthly payment, not including property taxes and insurance, is $995. How much total principal and interest will they pay for the house after 30 years?$168,200$190,000$358,200$548,200 The money demand curve is downward sloping because:. Based on the pasage, what overall theme does Jefferson seem to stress with Meriwether Lewis?a) the expedition must subdue Native Americans at any cost.b) the expedition must not disturb the French balance of power.c) The expedition has a political mission with social overtones.d) The expedition has an economic as well as a diplomaticmission. Jamila needs to spin a number greater than 4 to win. On the game spinner below, what is the probability of her winning? Given the equation 2 Square root of x minus 5 = 2, solve for x and identify if it is an extraneous solution except the dead load is 240lb/ft [3.50kN/m], the live load is 6 kips [26.7kN, the span is 20ft[6.10 m], and the section is a 1220. Unlike the french physiocrats who believed that the wealth of a nation came from the land and agricultural production, adam smith believed that the wealth of a nation came from its? assess how you would apply the requirements for possibility ofperformance A store Has Clearance Items that have been markeddown by 30% They arehaving a sale, advertising an additional 45% Clearance.of the original price do youend up paying?Not sure what I did wrong here I used the formula I was given. However its still wrong. Explain how cells were discovered. please help !!!for 10 point you MUST answer and explain What is the measure of 2A, in degrees?A. 60B. 120C. 150D. Cannot be determined