answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
2 years ago
12

Please help!! Caleb is working on a simple logic-based program to simulate a game of tic-tac-toe. Which programming language wou

ld he use?. Caleb would use ??? to write the tic-tac-toe program.
Computers and Technology
1 answer:
irga5000 [103]2 years ago
4 0

Basic language should do it

You might be interested in
Suppose your company has decided that it needs to make certain busy servers faster. Processes in the workload spend 60% of their
vekshin1

Answer:

CPU need 50% much faster

disk need 100% much faster

Explanation:

given data

workload spend time CPU  = 60%

workload spend time I/O = 40%

achieve overall system speedup = 25%

to find out

How much faster does CPU need and How much faster does the disk need

solution

we apply here Amdahl’s law for the overall speed of a computer that is express as

S = \frac{1}{(1-f)+ \frac{f}{k} }      .............................1

here f is fraction of work i.e 0.6 and S is overall speed  i.e 100% + 25% = 125 % and k is speed up of component

so put all value in equation 1 we get

S = \frac{1}{(1-f)+ \frac{f}{k} }  

1.25 = \frac{1}{(1-0.6)+ \frac{0.6}{k} }  

solve we get

k = 1.5

so we can say  CPU need 50% much faster

and

when f = 0.4 and S = 125 %

put the value in equation 1

S = \frac{1}{(1-f)+ \frac{f}{k} }  

1.25 = \frac{1}{(1-0.4)+ \frac{0.4}{k} }  

solve we get

k = 2

so here disk need 100% much faster

7 0
2 years ago
Value is always _____________ aligned in a cell. ​
Nadya [2.5K]

Answer:

Right

Explanation:

7 0
1 year ago
A(n) key is the set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the messag
a_sh-v [17]

Answer:

Algorithm

Explanation:

Algorithm is a set of instructions designed to perform a specific task, an independent sequence of actions to be perform to solve a problem and instruction for performing a computation.

Algorithm is A(n) key set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message; it sometimes refers to the programs that enable the cryptographic processes.

5 0
2 years ago
Read 2 more answers
Choose all items that represent characteristics of a functional resume. based on data obtained from a career portfolio lists pri
insens350 [35]

The answers are;

highlights job roles and skills rather than positions

contains data relevant to the position for which you are applying

based on data obtained from a career portfolio

Skills and achievements in a functional resume are the focal points. This is the reason why a functional resume is also known as the skills-based resume. This resume is not commonly used. However, job seekers who are changing careers or have gaps in their employment history typically use a functional resume to emphasize their capabilities. On the contrast, a traditional chronological resume shows a timeline of reverse work experience with brief explanations of each job.

4 0
2 years ago
Read 2 more answers
During which stage does the central processing unit analyze the instruction and encode it in the form of a number, and then gene
guapka [62]

Answer:

<em>a. fetch</em>

Explanation:

<em>The device collects a program command from its memory during the run cycle of the fetch. </em>

It then defines and performs the activities needed for that command.  The CPU continuously repeats the cycle of fetching, decoding, and executing a command while  the computer is switched on.

4 0
2 years ago
Other questions:
  • What is the argument in this function =AVERAGE(F3:F26)
    15·1 answer
  • Julie bought a house for $315,000 and has a $285,000 mortgage. she claims she has $315,000 in equity. is she correct? if not, ho
    12·2 answers
  • Two technicians are discussing lung protection in the shop. Technician A says that respiratory-protection devices can prevent yo
    5·2 answers
  • What is the formula equivalent to the function =SUM(B1:B5)?
    11·2 answers
  • There are many different types of hardware devices, different manufacturers, and countless configuration possibilities. Explain
    14·1 answer
  • FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i
    5·1 answer
  • Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
    5·1 answer
  • Select the correct answer. Andy wants to become a multimedia producer. Which degree can help him achieve this goal? A. bachelor’
    5·1 answer
  • Provide an example by creating a short story or explanation of an instance where availability would be broken.
    10·1 answer
  • (Java) Which of the following code segments correctly declare a Strings and gives it a value of "fortran".
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!