answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
2 years ago
9

Which expansion slot is used by an NVMe compliant device?

Computers and Technology
1 answer:
miskamm [114]2 years ago
5 0

Answer:

3. PCIe

Explanation:

An expansion card is a slot on the motherboard of a computer which allow users use an additional feature such as network, video, sound that may not be available before.

PCIe is an expansion slot that is used by an NVMe compliant device. NVMe is the short form or acronym for “Non–Volatile Memory express. ”

You might be interested in
Write three functions in C/C++: one that declares a large array statically, one that declares the same large array on the stack,
Nikolay [14]

Answer:

See explaination

Explanation:

#include<iostream>

#include<stack>

#include <algorithm> // std::make_heap, std::pop_heap, std::push_heap, std::sort_heap

#include <vector> // std::vector

using namespace std;

void StaticArray()

{

unsigned int array[64536];

for(unsigned int i=0;i<64536;i++)

array[i]=i;

}

void Stack()

{

stack<unsigned int> mystack;

for(unsigned int i=0;i<64536;i++)

mystack.push(i);

}

void Heap()

{

unsigned int myints[64536];

for(unsigned int i=0;i<64536;i++)

myints[i]=i;

vector<unsigned int> v(myints,myints+64535);

make_heap (v.begin(),v.end());

push_heap (v.begin(),v.end());

}

int main()

{

StaticArray();

Stack();

Heap();

return 0;

}

7 0
1 year ago
List at least three kinds of harms that a company could encounter from lost of service, that is, failure of availability. List t
WINSTONCH [101]

Answer:PART A

(1) Virus attack

(2) Fraud achieved by manipulating records by hackers

(3) Intellectual property theft.

PART B

COMPUTER SYSTEM

PART C

It will hurt the company in the following ways

(1) Loss business opportunities

(2) Increase in cost of operation as it will result in making certain expenses for it to be restored

(3) Loss of work time.

Explanation: Harm is any unanticipated eventualities that are capable of adversely affecting a person or an organisation. Harm can be as a result of theft or loss of certain resources which includes the COMPUTER SYSTEM.

When this loss takes place it can lead to Virus attack,fraud can be achieved by harkers through the manipulation of records, intellectual property theft.

THROUGH THIS HARM THE COMPANY WILL LOSS WORK TIME, LOSS SOME AMOUNT OF MONEY AND SOME BUSINESS OPPORTUNITIES.

5 0
2 years ago
Which option will you use to expose your presentation to the audience?
Liula [17]
<span>Which option will you use to expose your presentation to the audience?
</span><span>B)Slide Show</span>
6 0
2 years ago
Read 2 more answers
A database should have an identity separate from the applications (computer programs, forms, and reports) that use it. The separ
eduard

The separate identity allows the database definition to be changed without affecting related applications is known as <u>DATA.</u>

<u>Explanation:</u>

Normally nowadays program and database are keeping separately. MySQL server, mongo dB, oracle, sql server extra installed separate followed folder or separate drive in operating system.

So software program just use connectivity technology to add or update or delete information from in the database. Form or report just access the data from database and produce required output.

Normal SQL database will stored as records as rows in tables. Normally database can been access through database application directly to update records such as SQL PLUS, MYSQL workbench etc.

6 0
2 years ago
n the lab, the Ethernet II detail of the provided packet capture file indicated that Wireshark had determined that the _________
inysia [295]

Answer:

D

Explanation:

In the lab, the Ethernet II detail of the provided packet capture file indicated that Wireshark had determined that the type of traffic carried in the next layer was Internet Protocol (IP).

6 0
2 years ago
Other questions:
  • An automobile battery, when connected to a car radio, provides 12.5 V to the radio. When connected to a set of headlights, it pr
    11·1 answer
  • Modern operating system decouple a process address space from the machine's physical memory. list two advantages of this design.
    6·1 answer
  • Which of the following people is required by law to wear a seat belt? A. The operator of a truck weighing more than 26,000 lbs B
    15·1 answer
  • Suppose that a 10-mb file is stored on a disk on the same track (track 50) in consecutive sectors. the disk arm is currently sit
    13·1 answer
  • In which of these places might you be most likely to find a peer-to-peer network? On the Internet In a hospital In a home In a l
    5·2 answers
  • Consider a DASH system for which there are N video versions (at N different rates and qualities) and N audio versions (at N diff
    8·1 answer
  • The Web can play a significant role in making large amounts of information available to decision makers. Decision makers must be
    10·1 answer
  • A student who used a regression model that included indicator variables was upset when receiving only the following output on th
    10·1 answer
  • Amanda a recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter wher
    12·1 answer
  • Identify the tips to create a well-designed digital portfolio.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!