¿Cuántos megabytes (MB) de capacidad tiene una memoria USB de 16 GB? el que me diga por que le doy una coronita

Answers

Answer 1

Answer:

16,384MB

Explanation:

1GB contiene 1024MB de capacidad. Si multiplicamos esto por 16 veemos que 16GB es igual a 16,384MB. Este seria el espacio exacto, aunque se dice que 1GB tiene 1000MB. Eso es por que la palabra Giga significa x1000 y el numero binario entero mas cercano a 1000 es 1024. Entonces los ingenieros usan este numero para representar la cantidad de espacio en un GB que tambien seria [tex]2^{10}[/tex]


Related Questions

QUESTION 8
A weakness of PHP is that it only supports one database, MySQL.
True
False
QUESTION 9
All variable names in PHP are case-insensitive.
O True
False
QUESTION 10
An HTML form that is part of the PHP script that processes it is known as self-adhesive?
True
False

Answers

Answer:

question 8 is true

Explanation:

PHP is a server-side scripting language for creating dynamic web pages. ... The PHP programming language receives that request, makes a call to the MySQL database, obtains the requested information from the database, and then presents the requested information to your visitors through their web browsers.

Sensors send out ............ signals​

Answers

Answer:

mhmm................... ok

Exam Lesson Name: Introduction to Design Technology
Exam number. 700796RR
> Exam Guidelines
Exam Instructions
Question 8 of 20 :
Select the best answer for the question
8. Cycling through the design process to create several models that incrementally improve a solution is called what?
O A. Six Sigma
B. Success criteria
C. Just-in-time production
D. Iterative design
Mark for review (Will be highlighted on the review page)
Type here to search
O
Bi
S

Answers

Answer:

D. Iterative design

Explanation:

An iterative design can be defined as a cyclic process which typically involves prototyping, testing, evaluating or analyzing and refining of a product, so as to continually improve the product.

In an iterative design process, the following steps are adopted;

1. A prototype of the product is first created and tested by the manufacturer.

2. The product is then evaluated to check for any defect or flaw.

3. The defect or flaw is fixed through a refining process.

4. The previous steps are repeated incrementally until an improved version of the product is created.

Hence, cycling through the design process to create several models that incrementally improve a solution is called iterative design.

Answer:

Iterative Design

Explanation:

A. It seeks to figure what it defective

B. It reaffirms if all requirements are met to solve a problem

C. It's main goal was to avoid excess products that might not end up making sales in the near future

D. Making several revision on problems to take out an efficient solution

D makes the most sense here.

If the code for JAVA is LCXC, what is the code for BASIC?

Answers

Answer:

DCUKE

Explanation:

Given that,

Code for JAVA = LCXC

To find,

Code for BASIC = ?

As we observe the pattern,

In "JAVA", every letter moved two-letter forward in their alphabetical order or we can say that every third alphabet of the given letter is used to make the code:

J + 2 = L

A + 2 = C

V + 2 = X

A + 2 = C

Similarly,

B + 2 = D

A + 2  = C

S + 2 = U

I + 2  = K

C + 2 = E

Thus, DCUKE is the code for BASIC.

The code for BASIC given the code for JAVA is; DCUKE

We are given the code for JAVA as LCXC

From that code for "JAVA", we see that every letter is moved forward two letters in their alphabetical order. This means

J = L because L comes after J and KA = C because C comes after A and BV = X because X comes after V and UA = C because C comes after A and B

Similarly for BASIC;

B = D because D comes after B and CA = C because C comes after A and BS = U because U comes after S and TI = K because K comes after I and JC = E because E comes after C and D

Thus, finally the code for BASIC is DCUKE

Read more about JAVA at; https://brainly.com/question/18554491

Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.

Answers

Answer:

128 KB      

Explanation:

Given data :

The block size = 512 bytes

Block pointer size = 2 bytes

In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.

Therefore, the maximum number of block pointer in 1 block :

[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]

[tex]$=\frac{512}{2}$[/tex]

= 256

Thus, a block can hold maximum 256 pointers.

It is given the level of indexing is one. So,

Maximum size of the file =  maximum number of block pointers in 1 file x block size

                                          = 256 x 512

                                          [tex]$=2^8 \times 2^9$[/tex]

                                          [tex]$=2^{8+9}$[/tex]

                                           [tex]$=2^{17}$[/tex]

                                          [tex]$=2^7 \times 2^{10}$[/tex]

                                          [tex]$=128 \times 2^{10}$[/tex]

                                          = 128 KB   (∵ 1 KB = [tex]2^{10} \ B[/tex] )

Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.

How laggy is you're game cause I even lag in offline games this is just a random question. ​

Answers

Answer: its bad

Explanation:

Answer:

Lagging in offline games suggests there is something wrong with the computer, not the internet. There are various speed tests you can use to determine the speed of your internet! One being https://www.speedtest.net/ which is a more well known and trusted site. Depending on how old your computer is or if it is a laptop not build for games can influence your gameplay experience greatly.

You issue a transmission from your workstation to the following socket on your LAN: 10.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using

Answers

Answer:

POP

Explanation:

The application layer protocol that is been used here is POP, given that you issued a transmission to the socket on you LAN: 10.1.145:110.  and you use a standard port designation

Reason:

110 ( port number ) represents a POP3 process that is always used in a TCP/IP network , and the socket address started with an IP address as well. hence we can say that the application layer protocol is POP

Given the declaration: char a[] = "Hello"; char *p = a, *q; what operations are valid syntactically? Select all that apply. Group of answer choices q = &&a[0]; q = &&a; *q = *(&a[0]); q = &(*p);

Answers

Answer:

The valid operations are:

*q = *(&a[0]);  and q = &(*p);

Explanation:

Given

The above declarations

Required

The valid operations

*q = *(&a[0]);  and q = &(*p); are valid assignment operations.

However, q = &&a[0]; q = &&a; are invalid because:

The assignment operations intend to implicitly cast the char array a to pointer q. C++ does not allow such operation.

Hence, *q = *(&a[0]);  and q = &(*p); are valid

Another way to know the valid operations is to run the program and look out for the syntax errors thrown by the C++ compiler

An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.

Answers

An electronic [tex]\sf\purple{spreadsheet}[/tex] is an application you use to perform numeric calculations and to analyze and present numeric data.

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

An electronic spreadsheet is an application you use to perform numeric calculations and to analyze and present numeric data.

What is electronic spreadsheet?

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Microsoft Excel, Sheets, and Apple Numbers are a few examples of electronic spreadsheets.

Text, number, logical, and error data are the four categories of data. Each type can be used for a variety of tasks, so knowing which to use and when to use it is crucial.

You might also keep in mind that while exporting data into a spreadsheet, some data types might change.

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Thus, the answer is electronic spreadsheet.

For more details regarding spreadsheet, visit:

https://brainly.com/question/8284022

#SPJ6

Wi-fi refers to a network that is based on the ____ standard

Answers

Answer:

Wi-fi refers to a network that is based on the 802.11 standard.

Answer:

It is based on the 802.11 standard

Explanation:

how can you explain that algorithm and flowchart are problem solving tools?​

Answers

Answer:

Algorithm and flowchart are the powerful tools for learning programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way. Algorithm and flowcharts helps to clarify all the steps for solving the problem.

Modify a list Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph' ["Sam', 'Ann', 'Joe'l 1 user_input = input() 2 short names = user input.split() 3 short_names - short_names.pop(0) 6 print (short_names) based

Answers

Answer:

The modified program is as follows:

user_input = input()

short_names = list(user_input.split(" "))

short_names.pop(0)

short_names[-1] = "Joe"

print(short_names)

Explanation:

This gets the user input

user_input = input()

This converts input to list

short_names = list(user_input.split(" "))

This removes the first item of the list

short_names.pop(0)

This updates the last item to "Joe"

short_names[-1] = "Joe"

This prints the updated list

print(short_names)

Explain briefly the FIREWALLS

Answers

Answer:

Think of a firewall as your own personal security guard. The firewall will block unapproved websites from talking to your computer and will stop your computer from talking to unapproved/unnecessary websites. Hope this helps!

Explanation:

Carla is assigning tasks to others and she needs to ensure that she is aware of their progress. Which option should
she choose?
O Send status report when I complete an assigned task
O Completed task color
O Set Quick Click flag
O Keep my task list updated with copies of tasks

Answers

Answer: Send status report when I complete an assigned task

Explanation:

In order to be aware of their progress, the option to choose is the "Send status report when I complete an assigned task".

To do this click on options on the tools menu, then click on task options. Then, after the keep updated copies of the assigned tasks on my task list has been selected in the check box, one will then select "Send status reports when the assigned tasks are completed".

Does anyone know what type of Chromebook this is?

Answers

A chromebook of course lol jk look it up and u can find what kind it is

Answer: Its............ A Chromebook type of Chromebook...??

Explanation:

Ion know I aint a geek, geezer -_- (Thats a lie)

Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should determine if the string begins with an uppercase letter and ends with a punctuation mark. The method should return true if the string meets the criteria; otherwise it should return false .

Answers

Answer:

The method in Python is as follows:

def checkStr(strng):

   if strng[0].isupper() and strng[-1] == "?":

       return True

   else:

       return False

Explanation:

This defines the method

def checkStr(strng):

This checks if the first character i upper and if the last is "??

   if strng[0].isupper() and strng[-1] == "?":

If the condition is true, the function returns true

       return True

Else, it returns false

   else:

       return False

Write a Java method that prints a list of characters using the following header:public static void printChars (char ch1, char ch2, int numPerLine)This method prints chars between ch1 and ch2 (inclusive); the number of chars per-line is specified by int variable numPerLine. Then write and test Java programs that printa) characters from 1 to Z (uppercase), ten chars per line; b) all lowercase letters followed by all uppercase letters, 13 per line (Hint: you may want to call the method printChars twice in this second part)Consecutive characters on the same line should be separated by exactly one space.

Answers

Answer:

The method and the test cases is as follows:

import java.util.*;

public class Main{

public static void printChars (char [tex]ch1[/tex], char [tex]ch2[/tex], int [tex]numPerLine[/tex]){

    int count = 0;

    for(char ch = ch1; ch<=ch2; ch++){

        System.out.print(ch+" ");

        count++;

        if(count == numPerLine){

            System.out.println();

            count = 0;         }     }

    System.out.println(); }

public static void main(String[] args) {

 printChars('1','Z',10);

 printChars('a','z',13);

 printChars('A','Z',13);

}}

Explanation:

See attachment for complete source file where comments are used as explanation

Modity your program Modify the program to include two-character .com names, where the second character can be a letter or a number, e.g., a2.com. Hint: Add a second while loop nested in the outer loop, but following the first inner loop, that iterates through the numbers 0-9 2 Program to print all 2-letter domain names Run 3 Note that ord) and chr) convert between text and ASCII/ Uni 4 ord (.a.) is 97, ord('b') IS 98, and so on. chr(99) is 'c", et Running done. domain Two-letter a. com ?? . com ac.com ad. com ae.com ai. com ag.com names: 6 print'Two-letter domain names:" 8 letter1 'a' 9 letter2 10 while letter! < 'z': # Outer loop letter2a" while letter2 <- "z': # Inner loop 12 13 14 print('%s %s.com" % (letteri, letter2)) letter2chr(ord (letter2) 1) 15 letterl chr(ord(letter1) + 1) 16 17 h.com ai.com j com ak.com Feedback?

Answers

Answer:

The addition to the program is as follows:    digit = 0

   while digit <= 9:

       print('%s%d.com' % (letter1, digit))

       digit+=1

Explanation:

This initializes digit to 0

   digit = 0

This loop is repeated from 0 to 9 (inclusive)

   while digit <= 9:

This prints the domain (letter and digit)

       print('%s%d.com' % (letter1, digit))

This increases the digit by 1 for another domain

       digit+=1

See attachment for complete program

tools used to type text on Ms paint​

Answers

this is ur answer hope this answer will help u

What happens to a message when it is deleted?

It goes to a deleted items area.
It goes to a restored items area.
It is removed permanently.
It is archived with older messages.ppens to a message when it is deleted?

Answers

Answer:

it goes to the deleted items area

Explanation:

but it also depends on where you deleted it on

Answer: The answer would A

In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers

Answers

Answer:

Centralized Processing

Explanation:

Centralized processing was developed to process all of the data in a single computer, and since the first computers were stand-alone with all input and output devices in the same room, only the largest organizations could afford to use centralized processing.

What are the steps in finding the average height? Plz help ty :>


(Problem-solving questions
Use the problem-solving steps to develop an algorithm to solve the following problem
...Calculating the average height of all the children in your class)

Answers

Answer:

to calculate average, first add all the figures. Then divide by the amount of figures there are

Interpersonal skills during discussion with the boss

Answers

Answer:

Interpersonal skills are used to communicate with people. Such skills can be individually and in groups measured. Some interpersonal abilities include verbal communication, nonverbal communication, listening ability, ability to decide, etc. Facilitators and observers, therefore, monitor if participants have unqualified abilities.

Explanation:

— thinking about your boss's communication can be sufficient to cause anxiety and stress. You can nevertheless be confident and effective in communication with a little preparation and practice.

1. Write down all the topics you want to talk to and communicate before you talk to your boss.

2) Make sure you know what your boss wants or needs.

3) Rehearse in privacy what your boss is going to say.

4) Use qualifying words like "maybe" or "maybe" instead of absolute words, like "always," "everyone," "every time" or "never." 4) When you talk to your boss. Absolute speech can increase the defense and resistance of a person.

5) Make "I" statements, like "You" statements, like "you did not give me guidance," in the place of "You."

6) If you're emotional, avoid going to your boss. Give yourself time to refresh your thoughts and calm.

7) Talk to your boss before problems get hot and emotional involvement if possible.

8) Be a listener active. Learn what your boss says and really listen. Ask your boss to repeat or clarify an issue if you missed or were unaware.

9) Try to repeat and rephrase your boss's points to show that you listen to him and understand him or her during a convergence.

10) Practice a fine linguistic body. Look at your boss, lean in, and avoid fidgeting.

11) Be confident, not aggressive.

12) Maintain an open mind and compromise open.

13) Avoid spreading or gossiping about your boss's rumors.

14) Have good behavior.

15) Make sure you give love and recognition to your boss when it should.

16) Contact your boss regularly for a convenient relationship to develop and maintain.

2. 5s is a Chinese principle adapted for use in the workplace.
True or False​

Answers

Answer:

A. true

Explanation:

because 5s is the.................

A method named 'withdraw' in the CheckingAccount class throws a custom exception named 'OverdrawnException'. You want to scan in the value of the withdrawal amount from a file, and you need to make sure that the scanner is closed whether the withdrawal is successful or not. Fill in the blank to complete the code below to do that.
Scamner sconfiLe -muil: try t scanFile new Scanner(myFile); myAccount.withdrow(scanFile.nextDouble)); System.out.println(oe.getMessageC); if (scanFile! null) catch (OverdrawnException oe) f th all of
scanFile.close ():
}
}

Answers

Solution :

Scanner scanFile = null;

try {

scanFile = new Scanner(myFile);

myAccount.withdraw(scanFile.nextDouble());

} catch (OverdrawnException oe){

System.out.println(oe.getMessage());

} finally {

if (scanFile != null){

scanFile.close();

}

}

five technology tools and their uses​

Answers

Answer:

Electronic boards

Videoconferencing ability

Search engines

Cloud services

Computing softwares

Explanation:

Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :

The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.

Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.

Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.

Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.

Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.

loa (speaker) thuộc nhóm thiết bị nào ?

Answers

Answer:

this say's "Which device group?" hope i helpped

Physical safeguards, also called logical safeguards, and are applied in the hardware and software of information systems.

a. True
b. False

Answers

Answer:

False

Explanation:

They are not applied in the hardware and software of information systems.

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is
not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?
O Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.

IM TAKING TEST ANSWER PLS

Answers

Answer:

Option A

Explanation:

In case if Robyn is unable to find the frequently used command, then Robyn can use the back stage view to check for the command as the orientation setting allows to access more settings

Hence, option A is correct

why stress testing is needed?​

Answers

Answer:

To be able to test a product if it can withstand what it is supposed to before being released to the public for saftey reasons.

Answer:

Stress testing involves testing beyond normal operational capacity, often to a breaking point, to observe the results. Reasons can include:

Helps to determine breaking points or safe usage limits Helps to confirm mathematical model is accurate enough in predicting breaking points or safe usage limits Helps to confirm intended specifications are being met Helps to determine modes of failure (how exactly a system fails) Helps to test stable operation of a part or system outside standard usage Helps to determine the stability of the software.

Stress testing, in general, should put computer hardware under exaggerated levels of stress to ensure stability when used in a normal environment.

Other Questions
which statement would be true if you evaluate the expression 15x(465x4)a. the solution is 5 times as small as 3x(465x4)b. the solution is 3 times as small as 3x(465x4)c. the solution is 3 times as large as 5x(465x4)d. the solution is 3 times as large as 5x(465+4) Did you just say, Her name is MarciaWhere should the question mark be placed?Did you just say, Her name is Marcia?Did you just say, Her name is Marcia? PLEASE HELP!! WILL MARK BRAINLIEST TO WHOEVER GETS IT RIGHT Jake wants to surprise his parents with a small anniversary party at their favorite restaurant.It will cost $35.75 per person for dinner, including tip and tax.His budget for the party is $600.What is the maximum number of people Jake can have at the party without exceeding his budget? ExplorersMatch the explorer with their most important accomplishmentSamuel de Champlainexplored North America and the ArcticJames Cookestablished colony of QuebecRobert La Salleexplored MississippiHenry Hudsondiscovered Australia HELP WILL GIVE BRAINLIEST SHOW WORK LOOK AT IMAGE pls help me on this i don't know what to do Why do negative essay results not always mean Michael is absent Question 3 of 15What conditions will increase a nation's Human Development Index?Check all that apply.O A. People who live longer than the world averageO B. Long work hoursO C. The highest gross domestic product in the worldOD. A commitment to the education of its populationSUBMIT Can someone please help me answer this it's in the screenshots below PLEASE HELP ME WITH THIS ONE QUESTION The half-life of Barium-139 is 4.96 x 10^3 seconds. A sample contains 3.21 x 10^17 nuclei. What is the decay constant for this decay? what can you do to protect yourself from such abuse on social media platforms Choose all of the symbols that make the following sentence true.4 ^0 ___ 5 ^-1= En la inaguracion de unos juegos olimpicos, los 38 representantes de una nacion quieren desfilar formando columnas de 6es posible?de que modo podria desfilar formando columnas iguales? Can I get help with this? You dissolve 14 g of Mg(NO3)2 in water and dilute to750 mL. What is the molarity of this solution? how can cyberbullying contribute to emotional stress using data from 2010 and projected to 2020, the population of the United Kingdom (y, in millions) can be approximated by the equation 10.0y-4.55x=581. where x is the number of years after 2000 what is projected population in 2026? Tamara uses a coupon to save 20% off her purchase at the bookstore. The original cost of Tamara's purchase is d dollars.Which expressions represent the cost, in dollars, of Tamara's purchase after using the coupon? Choose all that apply. Simplify the given expression and enter in numerical form.6+5