_____moves the head to proper track

a.
Seek
b.
Data transfer
c.
Rotate
d.
Settle

Answers

Answer 1
to what it seems like the answer would be C
Answer 2
i believe the answer is C

Related Questions

After evidence is discovered in logs or alerts, how long does it typically take for someone in a firm to discover there is a security compromise in a system

Answers

After evidence is discovered in logs or alerts, it typically takes 197 days for someone in a firm to discover there is a security compromise in a system. According to the 2020 IBM Cost of a Data Breach report, it takes an average of 197 days for a company to recognize and identify a data breach.

A step-by-step explanation of this is as follows:

Companies must first identify potential compromises within their networks and systems. Alerts or logs will often reveal evidence that something is wrong within the system.

Investigations must then be carried out to determine the root cause of the warning. This can take some time since many factors, such as the system's complexity and the magnitude of the breach, may affect the amount of time it takes for the investigation to be completed.

Once the investigation is complete, the company may decide to alert the appropriate authorities, assess damages, and take remedial action to mitigate future breaches. The whole process can take weeks or even months, depending on the nature of the breach, the time and resources available, and the procedures in place to ensure proper response to data breaches.

Know more about the networks and systems click here:

https://brainly.com/question/30650307

#SPJ11

10 EASY POINTS❗️

1. If I give brainlist, will one of my brainlist be gone?
2. How do I make a question with 5 points instead of 10?

Answers

Answer:

You can't make something 5 points bc 10 is the minimum I believe. As for the BRAINIEST I'm not sure

Answer:

your brainiest wont be gone and there should be a button under where you type the question to change the point value

4

Write suitable technical terms for the following statements.
a. The classification computers into five distinct phases.
b. The generation of computers which used vacuum tube as main componen
The operating speed of third generation computers.
C.​

Answers

Answer:

a..computer generations

b...first generations

c...nanosecond

The suitable technical terms for the statements are:

a. Computer generations.

b. First generation computers.

c. Nanoseconds.

A computer can be defined as an electronic device that is designed with the capabilities to receive data in its raw form as input and processes these data into information that is usable by an end user.

Generally, computers are grouped into five (5) distinct categories based on technological development and this is referred to as computer generations. The classification computers into five(5) distinct phases include;

First (1st) generation computer: it used vacuum tube as its main component. Second (2nd) generation computer: it used transistors as its main component.Third (3rd) generation computer: it used integrated circuits (ICs) as its main component and as such could perform tasks in a very short period of time (nanoseconds), which is typically \(10^{-9}\) seconds.  Fourth (4th) generation computer: it used microprocessors as its main component. Fifth (5th) generation computer: it is designed with an artificial intelligence (AI) to perform tasks that are exclusively designed to be performed by humans or human intelligence.

Find more information: https://brainly.com/question/23694434

4Write suitable technical terms for the following statements.a. The classification computers into five

There are 4 types of computers: supercomputers, ________ computers, mid-range computers, and personal computers. (hint: m_____e)

Answers

There are four different categories of computers: mainframe computer, personal, mid-range, and supercomputers.

How do mainframe computers work?

Mainframes are fundamentally high-performance computers with a sizable quantity of memory and processors that can instantly process billions of basic calculations and transactions.

Are there still mainframe computers?

Many tech experts anticipated the demise of the mainframe sooner rather than later with the introduction of new technologies like the cloud and inexpensive x86 commodity servers. But it is not at all the case. The old mainframe is still useful for many businesses worldwide in 2021, in reality.

To know more about mainframe computer visit :-

https://brainly.com/question/14191803

#SPJ4

Use Relational Algabra to answer the following :

Create a query to get the ID of all students.

Create a query to get the ID of all students from Comp. Sci.

Create a query to get the ID of all students from Comp. Sci or Physics.

Create a query to get the ID of all students from Comp. Sci or Physics and name the result attribute StudentID.

Create a query to get the ID off all students and instructor. (not the result is just a relation with one attribute only)

Answers

Relational Algebra expressions are used to evaluate queries in relational databases. The expressions provide the foundation for all SQL-based systems and work on sets of data rather than individual records. Given below are the solutions to the given queries:

To answer your questions using relational algebra, here are the queries:

Query to get the ID of all students:

π(ID)(Students)

Query to get the ID of all students from Comp. Sci:

π(ID)(σ(Department = "Comp. Sci")(Students))

Query to get the ID of all students from Comp. Sci or Physics:

π(ID)(σ(Department = "Comp. Sci" ∨ Department = "Physics")(Students))

Query to get the ID of all students from Comp. Sci or Physics and name the result attribute StudentID:

ρ(StudentID/ID)(π(ID)(σ(Department = "Comp. Sci" ∨ Department = "Physics")(Students)))

Query to get the ID of all students and instructors:

π(ID)(Students) ⨝ π(ID)(Instructors)

Note: The queries assume that the "Students" and "Instructors" relations have attributes named "ID" and "Department" for students, and "ID" for instructors. Adjust the attribute names accordingly if they are different in your schema.

To know more about Relational Algebra expressions visit:

https://brainly.com/question/33354137

#SPJ11

Karl wants to change the page orientation of the printed worksheet. which group on the page layout tab contains the command to complete this action?

Answers

The Page Setup tab can be used to adjust the page orientation of the printed worksheet for Karl. Word has a number of formatting and page layout choices that modify how the material looks on the page.

Books, posters, and newsletters may all be designed with a more distinctive look by using page layout. A page layout document functions similarly to a canvas in that you may add text boxes, images, and other objects before arranging them as you like on the page.

There is no body text section when you open a page layout document (or template); you must build a text box and type in it to add content. New pages must be manually added.

Pages templates can be used for word processing or page layout. You can add or remove pages, work with objects, and more depending on the type of template you choose. You can change a document to another kind if you start with one type of template. If, for example, you like the text styles, colors, and layout of the School Newsletter template but prefer the design flexibility of a page layout document, you can convert the document to a page layout.

To learn more about Page orientation click here:

brainly.com/question/17853338

#SPJ4

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

your company has a lan in its downtown office and has now set up a lan in the manufacturing plant in the suburbs. to enable everyone to share data and resources between the two lans, what type of device is needed to connect them but keep them as separate lans?

Answers

Router  is needed to connect them but keep them as separate lans.

What is router explain?

An object that connects two or more packet-switched networks or subnetworks is a router. It manages traffic between these networks by forwarding data packets to their intended IP addresses and enables several devices to share a single Internet connection, which are its two main purposes.

Which two types of routers are there?

Older models of routers called "wired routers" have cable connections at both ends for data packet distribution and reception. The more modern wireless routers deliver data via radio signals directly to computers and other electronic devices.

Learn more about router

brainly.com/question/15851772

#SPJ4

7. 5 code practice:

Use the function written in the last lesson to calculate the students gpa. Ask them how many classes they are taking then ask them to enter the grades for each class and if it’s weighted. Your program should input the output average of gpa. Only do the weighted gpa

Answers

program should input the output average of GPA:

import sys

def GPAcalc(grade, response):       #fun to calculate gpa by taking Grade and response

if response != 1 and response != 0:

return sys.exit("Invalid response!")

elif grade=="A" and response==1:

return 5

elif grade=="A" and response==0:

return 4

elif grade=="B" and response==1:

return 4

elif grade=="B" and response==0:

return 3

elif grade=="C" and response==1:

return 3

elif grade=="C" and response==0:

return 2

elif grade=="D" and response==1:

return 2

elif grade=="D" and response==0:

return 1

elif grade=="F" and response==1:

return 1

elif grade=="F" and response==0:

return 0

else:

return sys.exit("Invalid Grade!")

def main():

sum = 0

num_classes = int(input("How many classes are you taking? "))   #ask for number of classes

for x in range(num_classes):        #for each class take input

grade = input("Enter your Letter Grade: ") #take input grade

resp = int(input("Is it weighted? (1 = yes) "))

print("Your GPA score is: %.2f" %GPAcalc(grade, resp)) #print gpa

sum += GPAcalc(grade, resp)

print("You weighted GPA is a %.2f" %(sum/num_classes)) #print averaged gpa

if __name__ == "__main__":

main()

input()

What does import do when encoding?

The import statement allows all functions to import from a module into your code. However, it is often the case that you want to import some functions or just one. In this case you can use the from statement. This allows you to import only the exact functions your code uses.

To learn more about module visit:

https://brainly.com/question/29849405

#SPJ4

i u were to make 1 new animal in the world what would it be? (it can be cross breed)

Answers

Answer:

lizard bird

Explanation:

What is a pseudocode in simple words (no plagiarism)

Answers

To use pseudocode, you don't have to adhere to any of the rules of formal programming languages or take into account the underlying technology.
It's a tool for sketching out a program's general structure. :)

____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.

Answers

Denial of Service (DoS) attacks exploit software weaknesses, causing degraded performance or server crashes on the victim's system.

These attacks overwhelm the targeted server with an excessive amount of traffic or resource requests, making it unable to respond to legitimate user requests. The goal is to disrupt the availability of the targeted system, rendering it inaccessible to users. DoS attacks can be carried out through various methods, such as flooding the network with traffic, exploiting software vulnerabilities, or overwhelming system resources. Mitigating these attacks involves implementing protective measures, such as firewalls, load balancers, and traffic filtering, to ensure the availability and reliability of servers and networks.

Learn more about DoS attacks here:

https://brainly.com/question/32253386

#SPJ11

The statement is incomplete, but based on the provided information, the term that fills the blank is "Denial of Service (DoS)" attacks.


Denial of Service attacks aim to disrupt the normal functioning of a system or network by overwhelming it with a high volume of malicious traffic or by exploiting vulnerabilities in the software to cause crashes or degraded performance.




learn more about Denial here :


https://brainly.com/question/13777500


#SPJ11

how are constants and variables different from each other

Answers

Answer:

variables are letters/shapes that are next to a number and constants are numbers without a variable

collectively, applications that are used to analyze data in information systems so it can be used to make decisions are called .

Answers

Collectively, applications that are used to analyze data in information systems so it can be used to make decisions are called business intelligence (BI) systems.

What are business intelligence (BI) systems?Business intelligence (BI) systems refer to applications that are used to analyze data in information systems so it can be used to make decisions. In this regard, they are designed to help organizations in decision-making processes by providing relevant information. BI systems allow organizations to gain insights into their data, monitor key metrics, and make data-driven decisions. They typically include tools for data mining, online analytical processing (OLAP), reporting, and visualization. By leveraging these tools, businesses can improve their performance by identifying and addressing problems, opportunities, and trends.

Learn more about analyze data here:

https://brainly.com/question/29356021

#SPJ11

each element of an array a[1, ..., n] is a digit (0, …, 9). the array is ordered: a[i]≤a[i 1] for all i. consider the problem of finding the sum of array a[1, ..., n]. can we do it in o(log n) time?

Answers

/* C++ programmed for calculating the sum of items in a given array */ #include bits/stdc++.h> with name space std;

/ function that returns the sum of the items in an array of size n int sum(int arr[], int n) int sum = 0; / Set up the sum / Loop over all items and add them to sum for (int I = 0; I n; i++) sum += arr[i]. return the total;

/ Driver code int main() int arr[] = 12, 3, 4, 15; int n = sizeof(arr) / sizeof(arr[0]); cout "The sum of the provided array is " sum(arr, n); return 0;

The two sum problem, a version of the subset sum problem, is a typical interview topic. For the subset sum problem, there is a common dynamic programming solution, but for the two sum problem, we can really develop an algorithm that runs in O(n) time. The goal is to identify all the pairings of two numbers that add to a certain S in an unsorted array. We can develop a quicker method that finds couples with sums that equal S in linear time. The approach below use hash tables, which have a fixed lookup time. As we go over the array, we check to see if S minus the current element is in the hash table. Because each lookup and insertion in a hash table takes O(n) time, we only need to cycle through the array once (1).

If the array is [4, 5, 1, 8] and the total is 6, the method will proceed as follows:

Learn more about lookup time from here;

https://brainly.com/question/28096745

#SPJ4

3. (5 pts) Run a man page on the cal command in background mode.
Use the ps command to view the processes
Kill the proff process (you may have to use kill -9 to do this)
Verify the process is terminated with the word defunct

Answers

To run a man page on the cal command in background mode, type "man cal &" in the terminal. The "&" symbol indicates that the command should be run in the background.

To view the processes, use the "ps" command and look for the process ID (PID) of the man command running in the background. You can use the "kill" command followed by the PID to terminate the process. However, if the process does not respond to the regular "kill" command, you may need to use "kill -9" to force the process to terminate.

After killing the process, use the "ps" command again to verify that the process is no longer running. If the process is terminated but still appears in the list with the status "defunct," this means that the process has been terminated, but its parent process has not yet acknowledged the termination. In this case, the process will eventually be cleaned up by the system, and the "defunct" status will disappear.

Overall, running commands in background mode can be useful for running processes that take a long time to complete or for running multiple processes at the same time. However, it is important to be familiar with the "ps" and "kill" commands to manage these processes effectively.

For more such questions on command, click on:

https://brainly.com/question/31447526

#SPJ11

question 41 which type of monitoring system is designed to stop unauthorized users from accessing or downloading sensitive data?

Answers

The type of monitoring system designed to stop unauthorized users from accessing or downloading sensitive data is known as a Data Loss Prevention (DLP) system.

DLP systems are designed to detect, monitor, and prevent data breaches by identifying and classifying sensitive data and enforcing policies that control the use, storage, and transmission of that data. These systems can be configured to block or encrypt data that is deemed sensitive and prevent it from being downloaded or shared by unauthorized users. DLP systems can monitor data in use, data in motion, and data at rest, and can be deployed at various points within an organization's network, including endpoints, servers, and network gateways.

Learn more about Data here:

https://brainly.com/question/13650923

#SPJ4

Exercise Define a function joint_distribution that • takes the distribution p and conditional distribution q as arguments, and • returns their joint distribution. In [ ]: def joint_distribution(p,q): # YOUR CODE HERE raise NotImplementedError() executed in 3ms, finished 19:28:14 2020-11-16 In [ ]: # tests assert joint_distribution({'H': 0.5, 'T': 0.5},{'H': {'H': 0.5, 'T': 0.5}, 'T': {'H': 0.5, 'I': 0.5}}) == {('H', 'H'): 0.25, ('H', 'T'): 0.25, ('T', 'H'): 0.25, ('I', 'T'): 0.25} assert joint_distribution({ 'H': 0, 'T': 1},{'H': {'H': 0.5, 'I': 0.5}, 'I': {'H': 0.5, 'I': 0.5}}) == {('H', 'H'): 0.0, ('H', 'T'): 0.0, ('T', 'H'): 0.5, ('T', 'T'): 0.5} assert joint_distribution({'H': 0.5, 'T': 0.5},{'H': {'H': 1, 'I': 0}, 'I':{'H': 0, 'T': 1}}) == {('H', 'H'): 0.5, ('H', 'T'): 0.0, ('T', 'H'): 0.0, ('T', '1'): 0.5}, {'H': 0.5, 'I': 0.5}

Answers

The function `joint_distribution` takes a distribution `p` and a conditional distribution `q` as arguments and returns their joint distribution. It iterates through the outcomes of `p` and `q`, multiplying the probabilities to calculate the joint probability, and stores the results in a dictionary.

To implement the `joint_distribution` function, we can iterate through the keys of `p` and `q` to create the combinations of outcomes. Then, we calculate the joint probability by multiplying the corresponding probabilities from `p` and `q`. We store the results in a dictionary and return it as the joint distribution.

Here's an example implementation of the `joint_distribution` function:

```python
def joint_distribution(p, q):
   joint_dist = {}
   for outcome_p in p:
       for outcome_q in q[outcome_p]:
           joint_prob = p[outcome_p] * q[outcome_p][outcome_q]
           joint_dist[(outcome_p, outcome_q)] = joint_prob
   return joint_dist
```

The function iterates through each outcome in `p` and `q`. It multiplies the probability of the outcome in `p` with the conditional probability of the corresponding outcome in `q` and stores the result in `joint_dist` with the outcome as a tuple key.

The implementation passes the provided tests, returning the expected joint distributions for the given inputs.

To learn more about Joint distribution, visit:

https://brainly.com/question/32759355

#SPJ11

which protocol is responsible for delivering packets to the right computers?

Answers

The Internet Protocol (IP) is responsible for delivering packets to the right computers on a network.

What is the IP?

IP is a network layer protocol that provides a unique address, known as an IP address, to every device connected to the network.

When a packet is sent, it contains both the source and destination IP addresses, allowing routers and other networking devices to direct the packet to its intended destination based on the destination IP address.

In this way, IP provides the necessary addressing and routing functions to ensure packets are delivered to the correct device on a network.

Read more about internet protocol here:

https://brainly.com/question/17820678

#SPJ1

Microcomputers, different from those giant mainframes and supercomputers, are designed for individuals. In fact, the microcomputer is often called the .

Answers

Personal computer

Hope this helps c:

The ______ layer in OSI model, converts characters and numbers to machine understandable language

Answers

The presentation layer in OSI model, converts characters and numbers to machine understandable language.

Its primary function is to make certain that facts from the application layer is well formatted, encoded, and presented for transmission over the community.

The presentation layer handles responsibilities such as records compression, encryption, and individual encoding/interpreting. It takes the statistics acquired from the application layer and prepares it in a layout that can be understood with the aid of the receiving quit. This consists of changing characters and numbers into a standardized illustration that may be interpreted by the underlying structures.

By appearing those conversions, the presentation layer permits extraordinary gadgets and structures to talk effectively, no matter their specific internal representations of records. It guarantees that facts despatched by using one gadget may be efficiently understood and interpreted with the aid of another system, regardless of their variations in encoding or representation.

Read more about presentation layer at:

https://brainly.com/question/31714231

science can be limited by the that is available at the time; inventions such as the telescope and microscope revolutionized our explanations of the cosmos and cells, respectively.

Answers

Science is limited by the technology that is available at the time. This means that the ability to observe, collect, and analyze data is restricted by the tools that are currently available.

This is why inventions such as the telescope and microscope have been so important in the history of science.The telescope allowed us to observe and study the cosmos in a way that was not possible before. It revealed new information about the planets, stars, and galaxies.

This revolutionized our understanding of the universe and how it works.Similarly, the microscope revolutionized our understanding of cells and how they function. It allowed us to see the intricacies of cells and their components, which was not possible before. This has led to many breakthroughs in biology and medicine.

Other examples of technology that have revolutionized science include the computer, which has allowed us to process and analyze data on a much larger scale, and the Large Hadron Collider, which has allowed us to study particles at a level that was previously impossible.

To know more about technology visit:

https://brainly.com/question/9171028

#SPJ11

Write 3 places clay can be found

Answers

Answer:

sediments , volcanic deposits

Explanation:

NOT!!! Do not use a library (queue) and (stack) , you write it
Write function to check the vowel letter at the beginning of
names in Queue?

Answers

The provided function allows you to check if names in a queue start with a vowel letter. It does not rely on any library functions and utilizes a comparison with a predefined list of vowels. This function facilitates the identification of names that meet the vowel letter criteria within the given queue.

The following function can be used to check if the names in a queue begin with a vowel letter:

```python

def check_vowel_at_beginning(queue):
   vowels = ['a', 'e', 'i', 'o', 'u']
   while not queue.empty():
       name = queue.get()
       first_letter = name[0].lower()
       if first_letter in vowels:
           print(f"The name '{name}' starts with a vowel letter.")
       else:
           print(f"The name '{name}' does not start with a vowel letter.")

```

In this function, we first define a list of vowel letters. Then, we iterate through the elements in the queue until it is empty. For each name in the queue, we extract the first letter using `name[0]` and convert it to lowercase using `.lower()`. We check if the first letter is present in the list of vowels. If it is, we print a message stating that the name starts with a vowel letter. If it's not, we print a message indicating that the name does not start with a vowel letter.

This function allows you to process the names in the queue and identify which ones begin with a vowel letter.

To learn more about Functions, visit:

https://brainly.com/question/15683939

#SPJ11

One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​

Answers

Answer:

flowchart errors

Explanation:

Answer:

flowchart errors

Explanation:

Read the Python program below: num1 = int(input()) num2 = 10 + num1 * 2 print(num2) num1 = 20 print(num1) Question 1 When this program is executed, if the user types 10 on the keyboard, what will be displayed on the screen as a result of executing line 3? A. 30 B. 40 C. 10 + 10 * 2 D. 10 + num1 * 2

Answers

Answer

B. 30

Explanation:

Assuming the code is written like this:

1. num1 = int(input())

2. num2 = 10 + num1 * 2

3. print(num2)

4. num1 = 20

5. print(num1)

Line 3 will print 30 when the number 10 is inputted at line 1.

Remember to use Order of Operations! :)

Which color mode is used most often for web and video?
Multichannel mode
CMYK
Red-Green-Blue
Grayscale mode

Answers

The color mode is used most often for web and video is Red-Green-Blue

RGB is the commonly known as the color mode that is ascribed to the web and most video (color screen) displays. RGB signifies for red, green, and blue. These colors do differ at intensity rate and it produces at least 16 million colors. Its color space is often used for images of different products.

Conclusively, we can therefore say The color mode is used most often for web and video is Red-Green-Blue.

Learn more from:

https://brainly.com/question/24904962

Pick all the correct answers

Pick all the correct answers

Answers

i think it’s A and D ...

WILL GIVE BRAINLIST PLEASE HELPPPPPPPP

WILL GIVE BRAINLIST PLEASE HELPPPPPPPP

Answers

Answer:

For question 2: C

Explanation:

I'll see what question 3 is.

Answer:

35mm film for oskar barnack

Complete the procedure for adding a contact by selecting the correct term from each drop-down menu.
1. Click the
button.
2. In the Contact window, enter information for the contact.
3. Click the
button

Answers

Answer:

1 new contact 2 save and close

Answer: New contact & Save & Close.

Explanation:

Complete the procedure for adding a contact by selecting the correct term from each drop-down menu.1.
Other Questions
true or false: global climate is driven solely by interaction between the atmosphere and hydrosphere. the inequality sign.If you multiply or divide both sides of an inequality by a negative number, you mustdoublereversesubtractDadd an equal sign to How much running area is there?R = 20 ftI WILL MARK YOU BRAINLIEST AND GIVE 30 POINTS which of the waves listed below has the shortest wavelength?infrared wavesradio wavesx-ray waves What is the best protocol for transferring a large database file through a network?TCP/IPUDPStreamAll answers are correct what is storage capacity HELP PLEASEEEEE!!!! Find m the open-door policy is an example of alternative dispute resolution. group of answer choices false true Why do many desert plants have small leaves?O Deserts are cold and small leaves help hold in heatO Leaves that have a small surface area lose less waterOSmall leaves protect desert plants from pollutionOSmall leaves protect desert plants from animals that eat plants Gramtica: Avoiding repetition: Direct object pronouns: Elige el pronombre de objeto directo que falta para completar la siguiente oracin.1. Cristina es amiga de Marcos y ella siempre ____ invita a cenar.lolate2. Laura viene a mi casa esta noche. Ella ____ visita todos los lunes.melola suppose that iq scores have a bell-shaped distribution with a mean of 98 98 and a standard deviation of 17 17 . using the empirical rule, what percentage of iq scores are greater than 64 64 ? please do not round your answer. Do the following lengths satisfy the Pythagorean Theorem? Lengths =14, 50, 48.YesNo in the movie voyage to the bottom of the sea, the earth is experiencing a rapid warming. in one scene, large icebergs break up into small, car size chunks that drop downward through the water and bounce off the hull of the submarine seaview. is this an example of good, bad, or ugly phsyics. explain. Facts on the Mexican-American war ? before the split in 1054 how did the eastern church and the western church view the pope differently How often should a business prove cash?O A. as often as necessaryOB. only once a yearOC. only once a monthD. only after a bank reconciliation what was the optimistic phrase white southerns used to describe the post-reconstruction south based on segregation, white supremacy and the development of a modern econy Select the correct answer. What is the solution to the equation? 2(x-4)^3/2=54 The slope of the parabola In the poem give me the splendid, silent sun from leaves of grass by Walt Whitman what are they saying about the sun