hybird computers have the speed of analog computer and accuracy of digital computer true or false

Answers

Answer 1

Hybrid computers have the speed of analog computer and accuracy of digital computer is a true statement.

What are the computers about?

Hybrid Computer are known for the features they have such as the fact that they have both analogue and digital computer and as such it can be as   fast like analogue computer.

Hence, Hybrid computers have the speed of analog computer and accuracy of digital computer is a true statement.

Learn more about hybrid computers  from

https://brainly.com/question/27934317

#SPJ1


Related Questions

I need help Asap!!! So the question is "Compare and contrast Web page and Websites". ​

Answers

Answer:

A website is a mix of web pages while a web page is a single entity.

Explanation:

A word or phrase to help identify a file when you do not know the file name during the file expiration search

Answers

step oneyou have to try the best to identify a file given when you do not know the filename during the file expiration search

step 2

you all know that a word or phrase is is the branch of grammar or question tag

step number 3

word is a group of letter giving some sence

step 4

phrase is a given sentence

last and final step

the file name is expiration because it is already given below

I hope it helps you in your homework please give me rating and like

and also don't forget to read the brainly.com

when you value stored in a variable its previous value gets _________.
a) Accepted b) Overwritten c) Overlapped​

Answers

Answer:

B

Explanation:

You wore more a thu friends

Was Nick Carson a good project manager? Why or why not?

Answers

Answer:

Nick Carson is not a good project manager because he did not focus on all aspects of the project. He also failed to provide accurate schedules and also detailed plans on the happenings of the project. He was performing other jobs leaving aside the work of project manager. Without concerning and understanding the problem of top management he delivered the project.

Explanation:

Explain an example of a blacklisting program and how it works

Answers

A blacklist might consist, for example, of a list of names developed by a company that refuses to hire individuals who have been identified as union organizers; a country that seeks to boycott trade with other countries for political reasons; a LABOR UNION that identifies firms with which it will not work

allows users to enter text and control the computer with their voice.allows users to enter text and control the computer with their voice.

Answers

Speech input software allows users to enter text and control the computer with their voice.

What is a speech software?

Speech recognition software is known to be a form of a computer program that is made to take the input of human speech and then they do interpret it, and change it into text.

Note that Speech input software allows users to enter text and control the computer with their voice.

Learn more about Speech input software from

https://brainly.com/question/27752622

#SPJ1

Which of the following closely represents the objective of the four dimensions in ITIL?
1. Handling of increased complexity of service management in modern scenarios
2. Holistic approach to Service management covering all key / aspects
3. Simplifying Service management to focus on only most critical aspects
4. Clear segregation of service management activities so that it can be assigned different functions/organizations

Answers

The option that closely represents the objective of the four dimensions in ITIL is Holistic approach to Service management covering all key / aspects.

What are the dimensions of service management ITIL?

They are:

PeopleProcessProducts or technologyPartners and suppliers.

Note that the four dimensions stands for the perspectives that are vital to right delivering value to customers and some stakeholders in the terms of products and services.

Hence, The option that closely represents the objective of the four dimensions in ITIL is Holistic approach to Service management covering all key / aspects.

Learn more about ITIL from

https://brainly.com/question/14098997

#SPJ1

In Linux, users are internally represented using a unique number called user ID or uid.

a. True
b. False

Answers

Answer:

a. True

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

In Linux, users are internally represented using a unique number called user ID or UID. Thus, this unique number serves as an internal identifier in the Linux Kernel and as such determines what system resources may be accessible to each user. Oftentimes, these unique numbers are not put into use but rather a name is linked with the number and are used instead.

Also, users can be organized logically into a group and are represented uniquely with a group ID or GID, which serves as a global identifier for the users.

I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?

Answers

Yes u need more brackets

Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==

Write code that declares a variable named minutes, which holds minutes worked on a job,
and assign a value.
Display the value in hours and minutes; for example:
197 minutes becomes 3 hours and 17 minutes.
c# language

Answers

The code that carried out the functions indicated above is stated below. It is not be noted that the code is written in C#

What is C#

C# is a type-safe, object-oriented programming language. It is pronounced "see sharp"

What is the code for the above task?

Using System;            

public class HoursAndMinutes

{

   public static void Main()

   {

      // declaring minutes variable and assigning 197 as given in question

       int minutes = 197;

     // outputing the total minutes , hours

       Console.WriteLine("{0} minutes is {1} hours and {2} minutes.", minutes, minutes/60, minutes%60);

   }

}

// OUT

Learn more about C#:
https://brainly.com/question/20211782
#SPJ1

the full meaning of ENIAC,ABACUS,EDVAC,EDSAC
and explain ​

Answers

Answer:

ENIAC: Electronic Numerical Integrator and Computer.

ABACUS: Abundant Beads, Addition and Calculation Utility System.

EDVAC: Electronic Discrete Variable Automatic Computer

EDSAC: Electronic Delay Storage Automatic Computer

You are creating a family budget for the year, using a spreadsheet application. Which is the best category of software to apply here?

Answers

In the case above, the best category of software to apply here is  operating system and application.

What is the operation operating system?

An operating system is known to be the tool that gives room for a computer user  to be able  to interact along with the system hardware.

Note that In the case above, the best category of software to apply here is  operating system and application.

Learn more about software from

https://brainly.com/question/1538272

#SPJ1

Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer.

Answers

In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in  fast time and i will also use descriptive file names.

The ways that i will use in the file management are:

I will use a single place for all kinds of documents. I will make a Folders in a kind of  Logical Hierarchy. I will also Nest Folders inside Folders. I will use the File Naming Conventions, etc.

What is file structure?

A file structure is known to be the ways or combination of depiction for data in files.

Hence, In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in  fast time.

Learn more about files from

brainly.com/question/1178560

#SPJ1

lists Five Examples of simple statement

Answers

Answer:

I am from Nepal . I am 15 years old. I have a good family . I am interest in speaking . I have many hobby.

Answer:

I like cats. cars are fascinating. I like coffee. I am a reader. I read 19 books every year.

Write a print statement that uses an f-string to output $5,242.83

Answers

Answer:

print("${:,.2f}".format(5242.83))

Explanation:

Given

$5,242.83

Required

Use an f string to output the above

The syntax of an f-string to format a number in that regard is: "${:,.2f}".format(number)

$ means that a dollar sign be printed before the required number

., means that the number be separated with commas

2f means that the number be presented in 2 decimal places

So:

"${:,.2f}".format(number) becomes

"${:,.2f}".format(5242.83)

In a print statement, the full instruction is:

print("${:,.2f}".format(5242.83))

Suppose in an Excel spreadsheet, the value in cell A1 is 25. By using the Macabacus local currency cycle shortcuts (Ctrl + Shift + 4) and pressing 4 two times, how will the value in cell A1 display?

Answers

Because pressing Ctrl + Shift + 4 converts the number to a currency format and hitting it again does not modify the format, the answer that should be selected is "$25.00.". This is further explained below.

What is an Excel spreadsheet,?

Generally, Cells in rows and columns may be used to organize, compute, and sort data in a spreadsheet. In a spreadsheet, data may be represented in the form of numerical numbers.

In conclusion, When using Ctrl + Shift + 4, it converts the number to a currency format, therefore the right answer is $25.00.

Read more about Excel spreadsheet

https://brainly.com/question/12339940

#SPJ1

Why is it difficult to attribute a single driving motivation to a group like Anonymous (in a way that’s not true for, say, Wal-Mart, Amazon, or Apple)?

Answers

It is difficult to attribute a single driving motivation to a group like Anonymous  because the fact is that Anonymous is said to be way different based on their philosophy that do not really put or place itself onto one kind of central or main idea.

What is a driver motivation?

The term of a driving motivation to a group is known to be based on the  Theory of Needs that was given by David McClelland.

It states that are three key drivers for motivation and they are:

A  need for achievementThe  need for affiliation The need for power.

Hence, It is difficult to attribute a single driving motivation to a group like Anonymous  because the fact is that Anonymous is said to be way different based on their philosophy that do not really put or place itself onto one kind of central or main idea.

Learn more about motivation from

https://brainly.com/question/11871721

#SPJ1

What is Polymorphism in java programing?​

Answers

Answer:

Polymorphism means "many forms".

Explanation:

Polymorphism means "many forms", and it occurs when we have many classes that are related to each other by inheritance. Like we specified in the previous chapter; Inheritance lets us inherit attributes and methods from another class. Polymorphism uses those methods to perform different tasks.

Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the same conditions, but is structured.

Answers

The segments of the flowcharts have been recreated such that  it does the same processes under the same conditions, but is structured. Their respective pseudo codes have also been created. See the attached pdf.

What is a pseudo code?

A pseudo code is a notation used in program design that looks like a simplified computer language.

Why is it important for flow chart to be structured?

This preference derives from the fact that such flowcharts are easier to understand and produce less mistakes in human perception.

The organized flowchart primarily aids the mission in the development of new algorithms by encapsulating a variety of data points within an interconnected depiction.

Learn more about flowcharts at;
https://brainly.com/question/6532130
#SPJ1

Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer

Answers

The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:

I will make use of the Default Installation Folders.I will create one Place to place all Documents. I will make Folders using  Logical Hierarchy. I will also Nest Folders inside Folders.I will use the File Naming Conventions, etc.

How do I keep my folders organized?

For any kind of file arrangement it entails the act of keeping files in an organized manner that one can easily trace back if one is in need of that file.

There it is good to Sort your files every time such as once a week and as such:

The kinds of actions that i will take to keep your files, folder names, folder structure, and yourself organized are:

I will make use of the Default Installation Folders.I will create one Place to place all Documents. I will make Folders using  Logical Hierarchy. I will also Nest Folders inside Folders.I will use the File Naming Conventions, etc.

Learn more about files from

https://brainly.com/question/1012126

#SPJ1

When should performance monitoring software be used to create baselines?

A When a network device fails
B. When the network is operating correctly C. When malware is detected
D. When troubleshooting a connectivity issue​

Answers

Answer:

D. I guess

Explanation:

because permon is mostly used to see;

- if the designed structured meets the requirements of the system

- it there are bugs

- if there are deficiencies

and in troubleshooting we monitor the issues that the structure has faced or to see if any defeciency will be face. so in connectivity issue troubleshooting we can use permon and create baseline of efficiencies and deficiencies... I'm not a professional in this field so my answer might be wrong.

4.13 LAB: Playlist (output linked list)
Given main(), complete the SongNode class to include the printSongInfo() method. Then write the Playlist class' printPlaylist() method to print all songs in the playlist. DO NOT print the dummy head node.

Ex: If the input is:

Stomp!
380
The Brothers Johnson
The Dude
337
Quincy Jones
You Don't Own Me
151
Lesley Gore
-1
the output is:

LIST OF SONGS
-------------
Title: Stomp!
Length: 380
Artist: The Brothers Johnson

Title: The Dude
Length: 337
Artist: Quincy Jones

Title: You Don't Own Me
Length: 151
Artist: Lesley Gore

Answers

The program based on the information is illustrated.

How to illustrate the program?

import java.util.Scanner;

public class Playlist {

public static void printPlaylist(SongNode songs){

SongNode song = songs.getNext();

while (song!=null) {

song.printSongInfo();

System.out.println();

song = song.getNext();

}

}

public static void main (String[] args) {

Scanner scnr = new Scanner(System.in);

SongNode headNode;

SongNode currNode;

SongNode lastNode;

String songTitle;

int songLength;

String songArtist;

// Front of nodes list

headNode = new SongNode();

lastNode = headNode;

// Read user input until -1 entered

songTitle = scnr.nextLine();

while (!songTitle.equals("-1")) {

songLength = scnr.nextInt();

scnr.nextLine();

songArtist = scnr.nextLine();

currNode = new SongNode(songTitle, songLength, songArtist);

lastNode.insertAfter(currNode);

lastNode = currNode;

songTitle = scnr.nextLine();

}

// Print linked list

System.out.println("LIST OF SONGS");

System.out.println("-------------");

printPlaylist(headNode);

}

}

class SongNode {

private String songTitle;

private int songLength;

private String songArtist;

private SongNode nextNodeRef; // Reference to the next node

public SongNode() {

songTitle = "";

songLength = 0;

songArtist = "";

nextNodeRef = null;

}

// Constructor

public SongNode(String songTitleInit, int songLengthInit, String songArtistInit) {

this.songTitle = songTitleInit;

this.songLength = songLengthInit;

this.songArtist = songArtistInit;

this.nextNodeRef = null;

}

// Constructor

public SongNode(String songTitleInit, int songLengthInit, String songArtistInit, SongNode nextLoc) {

this.songTitle = songTitleInit;

this.songLength = songLengthInit;

this.songArtist = songArtistInit;

this.nextNodeRef = nextLoc;

}

// insertAfter

public void insertAfter(SongNode nodeLoc) {

SongNode tmpNext;

tmpNext = this.nextNodeRef;

this.nextNodeRef = nodeLoc;

nodeLoc.nextNodeRef = tmpNext;

}

// Get location pointed by nextNodeRef

public SongNode getNext() {

return this.nextNodeRef;

}

public void printSongInfo(){

System.out.println("Title: "+this.songTitle);

System.out.println("Length: "+this.songLength);

System.out.println("Artist: "+this.songArtist);

}

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

Read three integers from user input without a prompt. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30.

Answers

Answer:

num1=2

num2=3

num3=5

num1= int(num1)

num2= int(num2)

num3= int(num3)

pro = num1*num2*num3

print(pro)

Explanation:

This is very close to a correct answer in easy code and easy to read, I was not able to put the answer in without the proper indentation alignment the way I would present this. So please adjust to your requirements for the indentation.

software is in -----language​

Answers

Answer:

Haruhi Suzumiya supremacy

How would you use SQL to change a table's structure? What general types of changes are possible? Which commands are used to implement these changes?

Answers

The SQL is used to change a table's structure by:

The use of the SQL ALTER TABLE command.

How is it done?

The SQL ALTER TABLE command is known to  be that which is often used to alter the structure of an existing table.

It is known to help one to be able to add or delete columns, make or destroy indexes, alter the kinds of existing columns, rename columns or the table itself.

Note that  It can also be used to alter the comment for any kind of table and type of the table therein.

Learn more about SQL from

https://brainly.com/question/25694408

#SPJ1

full meaning of ENDVAC

Answers

Answer:

EDVAC was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors John Mauchly and J. Presper Eckert proposed the EDVAC's construction in August 1944.

Explanation:

Here is the full meaning

Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jackie noticed the computer was working slower than usual. When Jackie clicked on a web site that she needed to review, the computer would not take her to the designated website. Instead, the computer took her to an alternative site. Jackie soon noticed that even when she was working offline using a word processing software program, the computer was acting up. When she went to
the medical software, she could not bring up patient account information.


Question:

What happened and what should Jackie do?

Answers

The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

What is a system hack?

System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.

Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious  app obstructing her.

Learn more about system hack from

https://brainly.com/question/13068599

#SPJ1


Name the eight areas in which computers are used.
1.
2.
3.
4.
5.
6.
7
8.
s Review (Page 121​

Answers

Answer:

pakistan

india

usa

china

uk

afghanistan

iran

iraq

israel

. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?
d) What is the largest unsigned binary number that can be accommodated in one word of memory?

Answers

Explanation:

d answer

gzjxubejeiizbtozueg

Fill in the missing terms relating to computer software

Answers

The missing terms relating to computer software are:

Utilitiesapplication software.What are Programs designed to perform specific tasks?

Programs that are made to carry out specific tasks is known as application software.

Note that An application software is said to be a computer software set up to carry out a group of coordinated functions and as such, The missing terms relating to computer software are:

Utilitiesapplication software.

Learn more about computer software from

https://brainly.com/question/1538272

#SPJ1

Other Questions
Anton feels he needs to continue his relationship with his wife because if they broke up, it would be very costly for him financially and damage his business. Anton is showing? The novel Parkinson's disease linked mutation G51D attenuates in vitro aggregation and membrane binding of alpha-synuclein, and enhances its secretion and nuclear localization in cells Choose MyPlate reminds Americans about maintaining balanced diets by using an illustration that features ______. A profit-maximizing firm in monopolistic competition should shut down in the short run if? why shall professional groups shall not be allowed to assign their own professional codes of conduct and police themselves from within Calculate the pH if the [H^+] = 9.71 10^-8 How is the kinetic energy of the particles of a substance affected during a phase change?O Kinetic energy increases during exothermic changes and decreases during endothermic changes.O Kinetic energy decreases during exothermic changes and increases during endothermic changes.O Kinetic energy does not change, but the potential energy does.O Kinetic energy changes in the opposite way that the potential energy changes. Modeling Periodic Trends 1:Why are periodic trends useful?What are some examples of periodic trends?What is ionization energy?What was the purpose of creating your three-dimensional model?Answer these questions in the discussion and conclusion of your Lab Report:How does your model represent ionization energy?What happens to the ionization energy of elements as you move from left to right across a period? Explain the trend.What happens to the ionization energy of elements as you move down a group? Explain the trend.In reactions between metals and nonmetals, metals tend to form cations while nonmetals tend to form anions. How does your model show this trend? You are hiking. The total weight of your backpackand its contents is 13 3/8 pounds. You want to carry no more than15 pounds. How many extra water bottles can you add to yourbackpack if each bottle weighs 3/4 pound? A rectangular equation that is a function will be a function in any coordinate system. true or false ? When a cold cP air mass passes over the warmer Great Lakes, it absorbs heat energy and moisture and becomes humidified. This is known as the_________________________________. Alan,becky and charlie share 72 sweets in the ratio 2:3:4. howmany sweets do they each receive? what is the product of the fraction below x/x-5 * 2x/x+4 A nurse is caring for a client with Crohn's Disease. Which of the following foods can be included in this client's diet? Select all that apply.a. Pastab. Eggsc. Raisinsd. Fresh celerye. Wild rice Cabbage juice indicator solutions can show pH values from acidic to basic.Which color represents the most basic solution? Which color represents the most acidic solution? Which color represents a neutral solution? Suppose that government requires airline companies to have at least 30 airplanes and serve at least 20 different airports. This is an example of why Msimangu is accompanying Stephen Khumalo? Ashley deposits $10 000 at the end of each month for 6 times at rate of 5% compounded monthly. How much will be in her accounta. at the end of 6th month?b. 3 months after her last deposit if rate of interest have remained level?c. at the end of 6th months if she misses the deposit in 3rd month?d. at the end of 6th months if she deposit $20 000 at the beginning of 1st monthe. at the end of 6th months if the rate growth to 6% from 4th monthsf. Construct the deposit table for each of the above questions The final result after substituting a value into an equation is the output.A. trueB. false Ali says 2 + 3 = 5, so 0.2 + 0.03 = 0.5. Is he correct? Why?