When an algorithm reaches a(n) ____ operation, it waits until someone or something provides it with a
value.
computational
arithmetic
input
output

Answers

Answer 1
The answer to this question is input operation. Input operation is the signals/data that received by the programs to start a certain operation.
In personal computers for example, input operation needs to be triggered by the computer users that click the icon on the screen or type something through the keyboards.

Related Questions

Describe three ways to protect the computer and all peripheral devices from damage

Answers

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. 

Ram can be thought of as the ____ for the computer’s processor.

Answers

memory






-----------------------------------

It is okay to perform experiments without your teacher's permission. This shows creativity.

Question 2 options:
True
False

Answers

It would be False, because if you were to mess up it can result in something going bad.

Monochrome refers to the use of one color in various shades and tints


True

False

True?

Answers

Your answer is gonna be true

There are two activities on your schedule, which are: 1) install server in lab 2) move server into the data center. however, the second task can't start until the server has run in the lab for 5 days without failure. this is an example of what?

Answers

There are two activities on your schedule, which are  example of Lag.

What is computers lag?

A lag is known to be a kind of delay (latency) that exist between the work of the user (input) and the reaction of the server aiding the task, which needs to be sent back to the client.

Note that in the above, There are two activities on your schedule, which are  example of Lag.

Learn more about lag from

https://brainly.com/question/8887133

SPJ9

Final answer:

The scenario illustrates a finish-to-start dependency in project management, where one task must be completed before the next can begin, highlighting the importance of understanding task dependencies in planning.

Explanation:

The question describes a scenario where a server must operate in a laboratory setting for five days without any failures before it can be moved into a data center. This situation exemplifies a dependency in project scheduling, specifically a finish-to-start dependency. In project management, dependencies dictate the order in which tasks must be completed. A finish-to-start dependency means that one task (in this case, the server running successfully in the lab for five days) must be finished before the subsequent task (moving the server into the data center) can begin.

In constructing a project timeline, recognizing and planning for these dependencies is crucial. Whether managing a simple project or orchestrating complex operations in a data center, understanding task dependencies helps in allocating resources efficiently and avoiding project delays. Consequently, this enables a smoother workflow and better project outcomes.

Which type of network topology is the most common and easiest to use?

Answers

A network layout or topology that is the most common, the most simple and easiest to use out of the four network topologies is the Bus topology, one cable is used for installation so it is also the cheapest network type.

What is the processor on a video card called? select one:

a. gpu

b. cpu

c. gddr

d. mpu?

Answers

a. Graphics Processing Unit

What information would be included in the data portion of an ethernet frame on an ip network?

Answers

I hope this is a trick question. The header portion of a packet has the networking stuff. The data portion has, the data.

To join two or more objects to make a larger whole is to _____________ them.
a.

regulate
b.

compliment
c.

integrate
d.

correlate

Answers

i think it would be C

Answer:

C) Integrate

Explanation:

Got it right on Edge :D

Before text can be formatted, you must first _____.

Answers

saved is the answer
hope it helps

How many bits would you need if you wanted to have the ability to count up to 1000?

Answers

For every bit you can record two possible data and the amount will increase by rate 2^x where x is the number of bit. To answer this question, you need to know what is the least amount 2^x that will be enough to record 1000 possibilities.
To do this, it is easier to divide the number with 32 for 5 bits(2^5=32), then divide it with 2 for 1 bit until it less than 1. The calculation would be: 1000/32= 31.25 /32= 0.976.
The answer would be 5 bit+ 5bit= 10 bit. (2^10= 1024)

Answer:

10 bits

Explanation:

it would be ten bits in total

Which osi reference model layer is associated with common networks (e.g., ethernet lans)?

Answers

OSI stands for Open Systems Interconnection. It is a reference model that enables interconnection between different applications in networks. The model has 7 layers: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer.
The first - the physical layer and the second data link layer, the network layer is associated with common networks (e.g. Ethernet LANs). The IEEE standard 802.2 describes the physical layer, while the standard 802.3 the second layer.

What is the largest number representable by an unsigned 32 bit integer?

Answers

2^32 - 1





----------------------------------------------------

what is an ad's target audience composed of

A. The few people who paid for the ad

B. The many people who created the ad

C. The people advertisers hope to reach

D. The people the ad features or pictures

Answers

C. An ad targets an audience the creators hope will but the product.

Final answer:

The correct answer is "The people advertisers hope to reach". The target audience of an ad is composed of the people that advertisers intend to reach and who are most likely to be receptive to their marketing message. This group is identified through analysis of demographic, psychographic, and behavioral characteristics. Ads are designed to appeal to the sensibilities of this audience, using visual and verbal cues strategically.

Explanation:

The correct answer to the question 'what is an ad's target audience composed of' is C. The people advertisers hope to reach. An ad's target audience is a specific group of consumers that advertisers have determined are most likely to respond positively to their message. Determining who the ad is designed for involves looking at factors such as demographics, interests, and behaviors. It could be designed for people from a particular political party, economic class, age group, or even people with specific interests or needs.

To understand who is pictured in the advertisement and who is left out can offer insights into the target audience. For example, if an ad for a luxury car features well-dressed individuals in an affluent setting, the target audience is likely high-income earners who value prestige and luxury. The people presented in ads are usually depicted in a manner that appeals to this target audience, which can be inferred from their expressions, the direction of their gaze, and even the camera angle used.

A target audience consists not only of individuals who will directly respond to the ad, but sometimes includes a secondary audience. These are individuals who may influence the primary audience or take actions that the ad seeks to encourage, such as philanthropists supporting a cause advertised, or legislators who could enact change based on the ad's message.

Ultimately, a target audience includes anyone capable of being persuaded and capable of creating the change that the advertiser seeks.

Which part of a window lets you see a fileâs contents without opening the file?

Answers

The preview pane. On the right hand side of the file explorer.

Many common web page designs use columns that are about ____ of the width of the page to approximate traditional aesthetic proportions.

Answers

Many common web page designs use columns that are about a third of the width of the page to approximate traditional aesthetic proportions.

Users with visual or hearing impairments, or who lack the full use of their hands, need web pages that are ____.

Answers

Easily workable to them. With voice controls, a read the text button and seeing help, like bigger logos and bold colors.

Which zone of the ocean is deepest ?

Answers

The zone of the ocean that is known to be the deepest is said to be called the Challenger Deep.

What is the ocean depth about?

The southern end of the Mariana Trench, which extends several hundred kilometers southwest of the U.S.-owned island of Guam, contains the deepest portion of the ocean, known as the Challenger Deep, which lies beneath the western Pacific Ocean. The depth of Challenger Deep is roughly 10,935 meters (35,876 ft).

Note also that the deepest area of the ocean is called the hadal zone, often referred to as the hado pelagic zone, and it is located within oceanic flour. The hadal zone is found in long, narrow, topographic  length that are between 6 and 11 kilometres (3.7 to 6.8 mi; 20,000 to 36,000 ft) below sea level.

Learn more about ocean from

https://brainly.com/question/13904384
#SPJ1

Final answer:

The deepest part of the ocean is the abyssal zone, located at depths of more than 4000 meters, characterized by high pressure, cold temperatures, and a unique chemosynthetic ecosystem.

Explanation:Deepest Ocean Zone

The deepest part of the ocean is the abyssal zone, which extends at depths of 4000 m or greater. Despite its inhospitable conditions, including extremely cold temperatures, very high pressure, and a lack of light that precludes photosynthesis, this zone supports a variety of life forms. This unique ecosystem is home to many invertebrates and fish that rely on chemosynthetic bacteria around hydrothermal vents. These bacteria utilize hydrogen sulfide and other minerals as an energy source, forming the base of the food chain in the abyssal zone.

Which ipv4 ip class provides for 126 unique networks, each having up to 16,777,214 hosts?

Answers

Class A.






----------------------------------------

What is the command for opening a spreadsheet object in a separate spreadsheet window

Answers

i had that problem all the time. do this:
right click on the excel icon on the computer and click for a new excel sheet

go to file and open
find the excel sheet
and now you have 2 sheets open

Answer:

Worksheet Object > Open

Explanation:

In the computerized environment, a command is a representation that literally commands and determines an action that the computer must perform. This command is usually performed by the computer user himself, however some software can perform this action.

An example of a command is the "Worksheet Object> Open" which is used when you want to open a spreadsheet object in a separate spreadsheet window.

Which four of the following hardware components are used to enable networking and are not part of a standalone computer? NIC protocols hub monitor mouse router switches printers

Answers

NIC, hub, router, and switches are the hardware components used to enable networking and are not part of a standalone computer.

Hope that helps :)

Answer:

NIC, hub, router, and switches

Explanation:

NIC (or network card) has the function to prepare, send and control data to the network. A network card serves as a physical interface between the computer and the cable. It prepares data output from the computer to the network cable, transfers it to another computer, and controls the flow of data between the computer and cable. It also translates the data coming from the cable and converts it into bytes, so that the computer's Central Unit understands it.Hubs are used to connect the various devices that make up a network, computers, printers, or others. The term hub is used to refer to a network device that connects computers to each other, but in reality it also serves as a repeater, because it passes or repeats all the information it receives to all its ports.A router is a device that connects several normally different segments on a single network. Once a router is turned on, it can make smart decisions about how to get the data to its destination based on the information it gets from the network itself.Switch - Like the hub, the switch connects multiple segments of a network, but with one major difference: while a hub distributes information across all ports simultaneously, the switch establishes a direct link between the sending device and the receiving device. .

Java compiler translates java source code into ________. question 11 options:

Answers

Answer:

bytecode

Explanation:

     Java compiler translates java code into an intermediate representation called bytecode. The bytecode in turn is executed on a Java Virtual Machine (JVM). The structure of the bytecode is standardized and forms part of the JVM specification.

    This is different from other programming languages like C/C++ where the source code is  compiled to executable which runs directly on the processor.

Java compiler translates java source code into Bytecode.

Bytecode is a low-level representation of the Java code that is platform-independent.

It is a set of instructions that can be executed by the Java Virtual Machine (JVM).

When you compile Java source code using a Java compiler, it converts the human-readable Java code into bytecode, which can then be executed by the JVM on different platforms, such as Windows, macOS, or Linux.

The JVM interprets and executes the bytecode to run the Java program.

To learn more on Java programming click:

https://brainly.com/question/33333142

#SPJ6

Which part of the chipset is the fast side?Which motherboard component is the most likely cause of the problem listed below? A computer repeatedly displays the incorrect date and time after being powered on.

Answers

Which part of the chipset is the fast side? 
That would be the northbridge because it connects directly to the processor.

A computer repeatedly displays the incorrect date and time after being powered on.
That would be the CMOS battery but the date and time could also be messed up in your BIOS and one would need to set it to the correct time. With that said, the answer is CMOS battery

During which stage of technical design are prototypes built

Answers

Hey, there! 

During which stage of technical design are prototypes built was

Answer: implement of a solution 

Good luck on your assignment and enjoy your day! 

~MeIsKaitlyn:)

Most windows computers typically use _____, which supports much larger hard drives and files than the older fat32 and includes better security and error-recovery capabilities.

Answers

NTFS NTFS (NT File System) is the file system that the NT operating system introduced in Windows NT 3.1 in 1993. It is a "journaling file system" which means that intentions for changes to the file system are first written to a special journal, then the actual changes are performed to the file system. This allows for NTFS to better recover from errors caused by power loss. The maximum theoretical size of a NTFS volume is 2^64 - 1 clusters with a cluster being typically 4KB long, although it can be as long as 64KB. The maximum length of a file in NTFS is 2^64 - 1024 bytes long. In contrast, the volume size limit for a FAT32 system is 2 terabytes using 512 byte sectors, or 16 terabytes using 4096 sectors and a maximum file size of 2^32 - 1 bytes.

The unique address for a particular web site is the ________.

Answers

The unique address for a particular web site is the domain.

_____ does not allow changing service or bandwidth because a website allows illegal media sharing

Answers

Final answer:

Net Neutrality does not allow changing service or bandwidth because a website allows illegal media sharing.

Explanation:

Net Neutrality ensures that internet service providers treat all online data equally, prohibiting discrimination or favoritism. It doesn't permit altering service or bandwidth based on the content of websites, including those facilitating illegal media sharing. Upholding Net Neutrality principles means ISPs can't selectively throttle or block access to specific sites or services.

Instead, they must provide consistent and nondiscriminatory access to all online content. This ensures fair and open access to information and services for users, regardless of the nature of the content they access. Thus, Net Neutrality safeguards against arbitrary restrictions based on the legality or illegality of online activities.

What type of software can you use to capture and examine the contents of network messages?

Answers

They're usually referred to as packet sniffers.

Richard works in a café for six hours a day and is paid $6 per hour for any extra time worked. If Richard worked 6.5 hours on Monday, 6 and a half hours on Tuesday, 6 hours on Wednesday, 6 hours on Thursday, and 6 hours and 30 minutes on Friday, how much extra money will Richard earn that week?

Answers

assuming he works 6 hours a day,
Richard would be paid $6 extra that week

1. How should a cover letter begin?
A. With an informal greeting like "Hey, there!"
B. With the hiring manager's name
C. With the name of the position
D. With "To Whom it May Concern"

2. If an occupation is projected to neither grow nor decline over the next 10 years, how would you rate the job outlook?
A. Advancing
B. Steady
C. Strong
D. Weak

Answers

I am not sure about 1 but on number 2, the answer would be B because the occupation is staying the same, or steady
A cover letter began with the hiring manager's name. Thus, option (B) is correct. When the job  is projected to neither grow nor decline over the next 10 years, then it is inferred as Steady. Thus, option (B) is correct.

What is a Cover Letter?

A cover letter refers to the document attached with the resume  that provides additional information about skills and experiences related to the job which the applicant is applying for. It is also known as application letter.

It is written in the paragraph form which includes about candidate's skills  experience and achievements in relation to the position. Furthermore, it is begun with the hiring manager's name.

If over the next ten years, an occupation neither increase nor contract, is shows that it that stable situation.

Therefore, It can be concluded that  option (B) is correct for first question and option (B) is correct for second question.

Learn more about cover letter here:

https://brainly.com/question/14204316

#SPJ2

Other Questions
What was the name of Jupiters big pet dog How does Max feel about his grandparents? Findf(5) forf(x). ... .. ... .... What would happen if the troposphere disappeared? Let a and b be the solutions of the quadratic equation $2x^2 - 8x + 7 = 0. Find 1/(2a)+(1/2b).Please help me! if a data set has 16 data values the number of values in the upper quartile is In October Greg and Thomas had the same amount of money in their savings account in November Greg deposited $120 into his account Thomas increased the money in his account by 20% when they compare their bounces they found out they were still equal Scientific laws explain_____. why a pattern in nature occurs how a pattern in nature occurs a pattern in nature observed over and over strong evidence in support of a hypothesis Read the lines from chapter 22 of The Adventures of Huckleberry Finn.Then at the bottom was the biggest line of all, which said:LADIES AND CHILDREN NOT ADMITTED."There," says he, "if that line don't fetch them, I don't know Arkansaw!"Twain is most likely using humor to convey his viewpoint that people are often tempted by the thrill of something naughty.people are often too ignorant to know when they are being fooled.liars and swindlers will stop at nothing to make fast and easy money.liars and swindlers are often considerate of the feelings of others. An atom of copper (cu) has a mass number of 63 and an atomic number of 29. how many protons does it have? lester and kari are playing a number pattern game. kari wrote the following pattern. 45.5,49,52.5,__,59.5what is the unknown number in the pattern kari wrote?show work A drought can cause the level of the local water supply to drop a few inches each week. Suppose the level of water supply drops 2 inches each week. How many will it change in 4 weeks? How did the Gulf of Tonkin Resolution lead to the escalation of US troop involvement in the Vietnam War?a.It gave the president the ability to send troops without specific approval of Congress.b.It declared war on North Vietnam, making commitment of US troops necessary.c.It barred South Vietnamese troops from the conflict, making it necessary for US troops to fight.d.It specifically committed the first US troops to fight and serve in the Vietnam War. "one dollar and eighty-seven cents. that was all. and sixty cents of it was in pennies. pennies saved one and two at a time by bulldozing the grocer and the vegetable man and the butcher until one's cheeks burned with the silent imputation of parsimony that such close dealing implied. three times della counted it. one dollar and eighty- seven cents. and the next day would be christmas." what can be inferred about della's feelings as she counted her money the day before christmas? select one:a. she feels nervous.b. she feels cheap.c. she feels embarrassed.d. she feels proud. That she was unhappy was obvious to all. the bolded words are what kind of clause? adjective clause adverb clause noun clause Need help with number 6. Also could you tell me if I did number 5 right? Thanks Yoon Ki drove form Phoenix to Tucson in 1 1/2 hours. Then she drove form Tucson to El Paso in 4 3/4 hours. The second part of her trip was how many times as long as the first part? Why is it important to be able to distinguish between events in a cause and effect relationship and those that are correlated Which of the following is true about responsibility in the U.S. Court system? Federal courts handle most appeals from the state courts of last resort, whereas the state courts address most crimes and civil cases. Federal courts handle constitutional law, but only the state courts can make new laws based on their interpretations. Federal courts handle local trial courts and most cases, though the state courts have authority to select certain cases to hear. Federal courts handle appeals from the state district courts, and state district courts handle appeals from federal courts as a check on the power of the courts. Briefly explain the operation of the stare decisis rule Steam Workshop Downloader