Explain the operation of an electric circuit in terms of voltage, current, and charge.

Answers

Answer 1
If its open its broken if its closed electricity flows
Answer 2

Answer:

If its open its broken if its closed electricity flows

Explanation:


Related Questions

n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each of which is an n- bit predictor. A two-level local predictor works in a similar fashion, but only keeps track of the past behavior of each individual branch to predict future behavior.There is a design trade-off involved with such predictors: correlating predictors require little memory for history, which allows them to maintain 2-bit predictors for a large number of individual branches (reducing the probability of branch instructions reusing the same predictor), while local predictors require substan- tially more memory to keep history and are thus limited to tracking a relatively small number of branch instructions. For this exercise, consider a (1,2) correlating predictor that can track four branches (requiring 16 bits) versus a (1,2) local pre- dictor that can track two branches using the same amount of memory. For the fol- lowing branch outcomes, provide each prediction, the table entry used to make the prediction, any updates to the table as a result of the prediction, and the final mis- prediction rate of each predictor. Assume that all branches up to this point have been taken. Initialize each predictor to the following:

Answers

Answer:

a

Explanation:

what level of system and network is required for cui

Answers

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

how do spear phishing attacks differ from standard phishing attacks?

Answers

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

how to install windows 11 on unsupported processor

Answers

Answer: You can't, if you anyway bypass the system, your device will run on risk.

Suggestion: Use any Linux distro similar windows 11. Like - Ubuntu/ Linux Mint/ ElementaryOs.

(Suggestion is only for if you can't run windows 10 or the pre installed Operating System in your machine.)

Why is the Game Design Document called a ""living"" document AND why is this important?

Answers

Answer:

documentation

Explanation:

Because it gives the instructions rules and every detail about the game with anything in the real world with computers documentation is extremly important  

Easy Question I will make you brainless Just answer this 10 question!!.​

Answers

Answer:

Utility knife - basket

Old newspaper - basket

Strong scissor-Sc

Clean soda can-Sc

Stapler - B

Scissor-basket

Push pin - Sc

Masking tape - Sc

Pin black-Sc

Glue-basket

write down the steps to start computer.​

Answers

Answer:

To start a Desktop PC:

Ensure the PC is plugged in.  

Press the power button.  

Let the computer start.

When prompted, insert the password if you have one set.  

To start a laptop:

Press the power button.

Let the laptop start.

When prompted, insert the password if you have one set.

the superclass javax.servlet.http.httpservlet was not found on the java build path

Answers

Answer:

follow this link https://stackoverflow.com/questions/22756153/the-superclass-javax-servlet-http-httpservlet-was-not-found-on-the-java-build

Explanation:

nice

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?

a. The user has not yet rebooted her laptop computer while at her new location.
b. The user needs a new IP address because she is working on a different floor.
c. The wireless network access point on the user's normal floor has failed.
d. The user is out of the effective range of the wireless access point on her floor.
e. The user has not yet logged off and back on to the network while at her new location.

Answers

Answer:

d. The user is out of the effective range of the wireless access point on her floor.

Explanation:

Which options are available in the Conditional Formatting dialog box?

Answers

Answer:

all but b are correct.

Explanation:

a researcher is interested in assessing risk-taking

Answers

Answer:

Risk-taking is a dangerous behavior

Explanation:

Knowing this he /she should take the proper safety measures

what safety do you need to have ready to start a device repair?

Answers

Answer:

Make sure to have the right tools for the right job. if you don't it would be probably best to send it to a shop to get fixed.

What language do programmers use to communicate with a computer?

Input code
Linguistic code
Programming code
Virtual code

Answers

Answer:

I would say programming code

Explanation:

Since its a system of rules written in a particular programming language

The language that programmers use to communicate with a computer is called "Programming code".

The correct option is C.

Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.

Programming languages can be divided into two categories: low-level and high-level.

Low-level languages are closer to the binary code that computers use to execute instructions.

High-level languages are more abstract and easier for humans to understand and use.

Examples of high-level languages include Python, Java, JavaScript, and C++.

Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.

Know more about programming language,

https://brainly.com/question/23959041

#SPJ3

Can someone check my answers?
I got 4 for c and 17 for d​

Answers

Answer:

both are correct

Explanation:

Why would you browse by entering a URL rather than use a link in a Web page

Answers

Answer:

Rather than entering a URL in a web browser, I prefer to browse the webpage. Because if you do browse in the browser you can see other alternative options to that website.

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

Consider the plain text ALLTHEBEST with key values 4,19,3,2,3,4,12,5,11,4 what will be the cipher text after applying vigenere cipher.

Answers

hi bae systems applied to the relationship

the first fully 64 bit compatible version of android is:

Answers

Answer:

Android 5.0 Lollipop, I hope this helped.

Answer:

The version of the first 64 bit andriod ia the version called: Andriod 5.0 lolipop

Hope this help please give the brainliest award.

how many times should the start function be defined in a program?

Answers

Answer:

0 1 2 However many you like

✓ I think its 2x they will start to define the program

Difference between batabse and database management system

Answers

Answer:A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). ... The data can then be easily accessed, managed, modified, updated, controlled, and organized.

Explanation:A database could be grades that students get at school and to manage it we can use a spreadsheet program like excel

Order the steps to describe how to attach a contact to a new email

Answers

Answer:

confirm image correct

Explanation:

which email attachments are generally safe to open

Answers

Answer:

i would suggest not opening ones that start with bit . ly

Explanation:

pls mark brainliest

Anything starting in https://

You have a 7 GHz dual core processor. How many decisions can the processor

make in one second? *


PLEASE HELP 10 points

Answers

The unit that you're asking about (GHz) refers to the frequency.
Frequency is the reciprocal of time.
This means that it gives the measure of work done per unit time.
For example, suppose you can throw two apples in one second then the frequency of your throw is 2Hz or 2Hertz.

what is the difference between internal and external css?

Answers

Answer:

Internal CSS are the ones that we can write within the same file i.e the HTML code and CSS code are placed in the same file. External CSS are that we can write in a separate file than the html code i.e the HTML file is separate like(index. ... css).

Explanation:

what are the seven phases of design plans that the main features of designer-client communication at each phase

Answers

Answer:

Step 1 – Study the Client Brief. ...

Step 2 – Research, Research, Research. ...

Step 3 – Brainstorm. ...

Step 4 – Sketch. ...

Step 5 – Concept Development. ...

Step 6 – Revisions. ...

Step 7 – Completion.

Explanation:

Match the letter with the corresponding Workspace Area

Options :

-workspace settings

-options bar

-menu bar

-toolbar

Answers

The workspace areas described are editing tools of the photoshop program

The options described below are part of the Adobe Photoshop program for image and photo editing.

Workspace settings: It is a bar to configure the general aspects of the workspace in which an image is going to be edited or created.

Options bar: It is a bar located in the upper part (second row) of the document in which we have different options depending on the tool of the toolbar that we choose.

Menu bar: It is the bar located at the top (first row) in which we find different options such as:

FileEditionImageCapTextSelectionFilter3DViewWindowHelp

Toolbar: It is the bar located on the left side of the screen where we find different editing tools for our file, such as:

MoveMagnetic loopTrimDropperBrushDraftDegradedFeather

Note: This question is incomplete because the information is incomplete. However, I can answer based on my previous knowledge.

Learn more in: https://brainly.com/question/24964958

based on mla guidelines, what is the correct margin width?

Answers

Answer:

Leave 1 inch margins on each side.

I will make you brainless Just answer this question!!!!

A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on...​

Answers

Answer:

6, 8,5,3,4,1,9,2,7

Explanation:

Just like that

Answer:

6, 8, 1, 3, 4, 2, 9, 5, 7

Which of the following are advantages of using meaningful names for variables when writing a program? Select two answers.
1. Less variables will be required as the existing ones can be renamed throughout the program.
2. It is easier for a person reading the code to identify the purpose of a variable and follow the logic of the program.
3. It is simpler for the compiler to compile the program, meaning wait times and errors are reduced.
4. The programmer is less likely to make a mistake and use a variable for the wrong purpose.

Answers

Answer:

The answer is 2 and 4, please give brainliest award.

What refers to the place you drag and drop blocks to create instructions in Scratch?

A.
playground

B.
sprite

C.
editor

D.
environment

Answers

Answer:

It is called the editor script area, hence the name is where you create and edit code.

Hope this help please give the brainliest award.

Other Questions
The Pacific Ocean would be found at which number on the map?2345 Give a five filipino musical instruments and why you want to include them in your band Which prehistorical human developments were most integral to the creation of civilization? Include at least three developments in your discussion. who was the last person to sign the declaration of independence Hai in tch q1 = 8*10^-8C, q2 = -8*10^-8C t ti A,B trong khng kh, AB=4cm. Xc nh cng in trng ti C vi:a) CA = CB = 2cmb) CA= 8cm, CB = 4cmc) CA = CB = 4cmd) CA = 3cm, CB = 5cm Solve for y.6x + y = 10 7. Write 1.07 x 103 in standard form. Complete the following statement.Some people say Mauna Kea is a taller mountain than Mt. Everest, because its total under sea and above sea level height is meters. someone please help me my math teacher didnt even come to class today Which number rounds to 3,400 when rounded to the nearest hundred?O 3,3483,429O 3,504O 3, 637 which level of protein structure do beta-pleated sheets and alpha helices represent? A wave is any movement that carries energy. Some waves carry energy through water. Others carry energy through gases, like air, or solid materials. If you drop a rock into a pool of water, a wave, or ripple of energy, skims across the pool's surface. In the same way, an underwater earthquake can release energy into ocean water. Then it carries a giant wave, or tsunami, across the surface until it hits land.A. to inform readers about different kinds of wavesB. to persuade readers to throw rocks into the waterC. to entertain readers with the legend of Wally WaveD. to teach readers how to use a surfboard to ride waves Please help 2. What does the mitochondria do in cells? Pythagorean theorem digital escape. Can you find the length and area and type the correct code Which of the following is hypothesis A. If plant receives more water, then it will grow tallerB. What happens if a plant receives a lot of water?C. Plants need water to grow. What is the connotation? Which of the following may be found in the epidermis?hair folliclesfat cellssweat glandswarts How to solve this proof? definition of mental A girl rides a bicycle with a speed of 10km/h for 2h and 15km/h for the next 3h. find the distance moved by her and average speed