A(n) ________ CPU has two processing paths, allowing it to process more than one instruction at a time. Group of answer choices dual-core bimodal all-in-one dual-mode Flag question: Question 79 Question 791 pts ________ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences. Group of answer choices Repetitive strain prevention Ergonomics Positioning Occupational safety

Answers

Answer 1

Answer:

A dual CPU has two processing paths, allowing it to process more than one instruction at a time.

Ergonomics is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences.


Related Questions

Select the correct answer from each drop-down menu.
Kawika is a math teacher. His students recently took a test. He has recorded their scores in a spreadsheet, using functions to analyze the scores. Which functions should he use to determine the top and mean scores?

Kawika can use the ____ function to find the top score and the ____ function to find the mean score.

First blank:
1. MIN
2. COUNT
3. MAX

Second blank:
1. AVERAGE
2. ROUND
3. SUM

Answers

Answer:

First blank:  MAX

Second blank:  AVERAGE

Explanation:

Required

Complete the blanks

The first blank is to be filled with a function that calculates the highest score from a given range of scores (cells).

To do this, we make use of the MAX function, and the syntax is:

=MAX(cell_range)

The second blank is to be filled with a function that calculates the mean score from a given range of scores (cells).

To do this, we make use of the AVERAGE function, and the syntax is:

=AVERAGE(cell_range)

Answer:

MAX

AVERAGE

Explanation:

I got it right on the Edmentum test.

what is file management?can please help me​

Answers

is the process of administering a system that correctly handles digital data. also i think it improves the overall function of a business workflow. but this could be totally wrong.
File Management includes common operations performed on files or groups of files, include creating, opening, renaming, moving or copying, deleting and searching for files, as well as modifying file attributes, properties and file permissions

write a program to calculate the volume of a cylinder​

Answers

bro mark me brainliest i’m struggling with algebra 2 rn

Answer:

program by READ DATA statement

Explanation:

CLS

REm to find the volume of a cylinder

READ π , [tex]r^{2}[/tex] , h

PRINT " pie =";P

PRINT "radius =";r

PRINT "height";h

PRINT "V=";π*[tex]r^{2}[/tex]*h

DATA = 22/7 , 4, 6

END

Which of the following devices might be used to transmit electronic mail? *
1 point
(A) Printer
(B) Monitor
(C) Fax machine
(D) Smartphone​

Answers

I believe it is smartphone because a printer prints, a monitor displays information from a computer(does not control it) and a fax machine well faxs stuff so it would only be smart phone

Dana frequently joins people in online discussion boards and forums. Which of her habits should she change to maintain proper netiquette?

Answers

Answer:

The correct option is a. correcting others’ spelling and grammar.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Dana frequently joins people in online discussion boards and forums. Which of her habits should she change to maintain proper netiquette?

a. correcting others’ spelling and grammar

b. using a conversational tone

c . breaking large comments into readable paragraphs

d. typing whole sentences with capital letters

The explanation of the answer is now given as follows:

Grammar lessons should not be given in a casual conversation unless the person is a language teacher or has been specifically asked to assist. This indicates that correcting others' spelling and grammar in a normal conversation is often considered impolite. It's simply not polite and a sign of lack of etiquette to criticize the actions of other people when you have not been specifically appointed or when you are not in a position to do so.

Therefore, the correct option is a. correcting others’ spelling and grammar.

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

list the three sources of naturally occurring materials​

Answers

Answer:

Flint

granite

sandstone

________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.

Answers

Answer:

Premises

On-premise security refers to the hardware and software solutions that protect businesses data from outside and inside threats.

3. The art or technique of decorating wood or leather by burning a design on the surface
with a heated metallic point.
A. Pyrography
C. Wood Turning
B. Gilding
D. Hand Carving
4. Combines several techniques that involve inserting decorative pieces into a base
object to incorporate new designs on the original products.
A. Flocking Technique
C. Inlying
B.
Hand Carving
D. Gilding
5. Lines the interior of drawers and boxes with a soft velvety finish
A. Flocking Technique
C. Inlying
B. Hand Carving
D. Gilding
6. It is used to color wood to give an illusion of texture. This may come in two varieties.
A. Staining
C. Pigment-based
B. Dye-based
D. Inlaying
7. Stain will color small pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
8. Stain will color large pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
9. Decorative technique in which powder is applied on wood or other materials to give a
thin coating of gold from.
A. Inlaying
C. Gilding
B. Staining
D. Wood Carving
10. The simplest way of decorating wood since there are a variety of colors that you can choose from.
One may also add a lacquer finish to make, it shiny and glossy,
A. Flocking Technique
B. Staining
C. Gilding
D. Painting


due tomorrow pls help I'll make brainliest I promise unrelated answer will get reported​

Answers

Answer:

The answer of number three is pyrography.

dash is a collection of sequentially arranged slides put together in the from of a file​

Answers

Answer: Presentation

Explanation:

A presentation refers to the collection of sequentially arranged slides that are put together in the from of a file​.

Presentations are used by businesses and professional firms to inform, educate, and persuade the audiences. Companies use presentations to train their employees, and communicate with their clients by using words and images to engage them.

A two-dimensional array is essentially?
A primitive date type
A looped data structure

Answers

Answer:

A looped data structure

Explanation:

A two-dimensional array is an array of another array. You can traverse it using nested loops, one to traverse row and one to traverse columns.

The formula =average(B1:B2) displays the value____(see the picture down)

Answers

9514 1404 393

Answer:

  (a)  10

Explanation:

The formula displays the average of the values 8 and 12. That average is ...

  (8+12)/2 = 10

Is 10 teraflops good? How much does the best PC in the world have?​

Answers

Yeah it’s pretty good. The system, built by Fujitsu for Japan's RIKEN Center for Computational Science, posted a maximum sustained performance level of 442,010 teraflops per second on the Linpack benchmark.

Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she is only running part of the computer program. Which is she using

Answers

Answer:

breakpoints.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Debugging and maintenance.

In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.

Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.

At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.

Answer:

C for Edge

Explanation:

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

Fruits, stones and other organic pigments are examples of what?
O Natural materials
O Synthetic materials
O Cultural materials
O Modern art supplies

Answers

Natural materials
Hope this helps

how can the government protect human rights​

Answers

Answer:

governments can: Create constitutional guarantees of human rights. Provide ways for people who have suffered human rights violations by the government to seek legal remedies from domestic and international courts. Sign international human rights treaties.

The bill of rights protects freedom of speech, freedom of religion, the right to keep and bear arms, the freedom of assembly and the freedom to petition.

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next

Answers

Answer:

Obviously update the router

Explanation:

Keeping your router up to date is also a really important thing to do to protect your network from vulnerabilities. Outdated systems are easy targets for new methods of hacking.

What is Sleep mode? Check all of the boxes that apply.

It is a power-saving mode for a computer.

It puts your work and computer settings in memory while using little power.

It is a power-saving mode designed for laptops.

It is the same thing as Hibernate mode.
The supreme court's ruling in Marbury v. Madison was important because it

Answers

It is a power-saving mode for a computer.

It is a power-saving mode designed for laptops.

What type of communication takes place between two individuals or parties and involves the use of encryption so that only the desired individuals have access to what is being said or heard

Answers

Answer:

private

Explanation:

which structure does a web page normally use to define an area of focus

Answers

Answer:

Grid structure

Explanation:

who likes video games

Answers

i wish i could play but my strict mom would never let me :’(

A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices

Answers

Answer:

Private.

Explanation:

The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.

Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.

Thus, a private cloud is a correct answer.

write a program to calculate the area of rectangle​

Answers

Answer:

program by LET statement

Explanation:

CLS

REM to find the area of rectangle

LET L=40

LET B=20

LET AOR=L*B

PRINT "AOR=";AOR

END

                                                                                         Press F5

output

AOR=800

What are some signs that could help you determine that a date and time was inserted as a special object instead of
typed as normal text? Check all that apply.

Answers

Answer:

i) It is difficult to put the mouse pointer's insertion point in the text

ii) A gray border appear around the time and date when you point to it

Explanation:

When the date and time is pointed to or hovered using the mouse pointer, we have, that the background of the text changes to a grey border around the text when the date and time is inserted as a special object using the insert date and time button on the insert menu in the word processing application

The mouse pointer behaves different when working with some applications, and it could be difficult to place the insertion point of the mouse pointer in the  text

Therefore, the correct options are;

It is difficult to put the mouse pointer's insertion point in the text and

A gray border appear around the time and date when you point to it.

The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag

Answers

I assume you are talking about Excel?. You first--enter your initial date on the first cell and click the cell with the first date to select it, then drag the fill handle.

One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed over many units in the network.

Answers

Answer:

connectionist

Explanation:

One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.

A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files

Answers

Answer:

A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune policies are properly set up and assigned to her. What could be the issue that is blocking her from accessing the files? The user's device is rooted or jailbroken.

11. Find the output of the following programs:
CLS
X= 7
FOR I = 1 to 10
PRINT X
IF X MOD 2 = 0 THEN
X= X/2
ELSE
X=X* 3+1
END IF
Next I
END​

Answers

Answer:

See picture.

Explanation:

Ran it on repl it.

Other Questions
Consider two firms producing smartphones. Firm A uses a highly automated robotics process, while Firm B uses human workers on an assembly line and pays overtime when there is heavy production demand. Firm A and B have a similar amount of financial leverage. Which firm will have a higher beta whether you think it is a good solution or not? Explain why Attempt any 6 out of 8 given single words for phrases and sentences (Words denoting places):1) The house or shelter of an Eskimo2) The home of a lion3) Aplace where scientific experiments are conducted4) Abuilding for the lodging and accommodation of soldiers5) Residence for Nuns6) Aplace where fruit trees are grown7) Aschool for infants8) Aplace for housing cars Which one of the following characters would be classified as flat?the hunter who places traps along the river to catch small wild animalsthe boy's mother who worries and searches for the boy and dogO a local sheriff who leads the rescue team in an effort to find the boy and his dogO a young boy who rescues his dog from a hunter's trap during a forest fire PLZZZZZZZZ HELPPPPPPPP 100 points I SWEAR ITS TIMED AND ITS L ART will make you brainlest i ppromisWhen you find an opinion in you notes, which question should you ask?What do I believe?Why should I continue reading this?What does this person want me to think or believe?What is this person know?If someone has experience related to your topic but isn't a scientist or professional, what should you do before using details they provide?Change some key details in their story.Ask someone else if their story makes sense.Make sure any facts they provide are true.When different people interpret the same information, which is most likely to happen?People will have differing views about a topic.Everyone will have the same view about a topic.Most people don't want to understand a topic at all. A 6 kg rock is dropped off a 10 m cliff and hits the ground with a velocity of 12.5 m/s. How much work is done by air resistance on the rock What evidence from the text helps you infer that the main character of "Top ofthe Food Chain" is an unreliable narrator?A. He gives data and statistics that help to support his mainargumentB. He seems unaware that his decisions are the cause of all of theproblemsC. He appears to be speaking to the Senate in an official capacityD. He makes the audience feel sorry for the people who are suffering,SUBMIT Plot the points (2, 5), (2, -4), (10, 5), and (10, -4) on a coordinate plane. What is the perimeter of this polygon? What is the inverse operation of multiply by 12? A. add 12 B. subtract 12 C. multiply by 12 D. divide by 12 Company FIN3610-FTRA has a six-year project that requires an initial investment of $30,000. Every year, the project will pay fixed costs of $20,000 to produce the product. Also, we know that the variable costs per unit will be $36, and the price per unit will be $58. The required return is 10%. Please calculate the financial break-even quantity for this project. (Do not round intermediate calculations and round your answer to 3 decimal places, e.g., 32.161.) What's the value of X for the figure below? How long would it take a 4,560 watt motor to raise a 166 kg piano to an apartment window15 meters above the ground? Find the missing side of the triangle. Solve for X Choose the word that completes the sentence.going toUnfortunately, I hear that the weatherbe nice until the weekend.were notis notnotwill not After visiting the Titanic, Captain Ngoc and Commander Chris are taking the SSN-21 Seawolf submarine back to the surface of the water. They start 2000 meters below the surface of the water and ascend at 55 meters per hour. A) Write an equation in slope-intercept form to model this situation where D is the distance under water and H is the time in hours. B) How many meters below the surface is the submarine after 6 hours? An economic transaction in which one party trades a good or service for another good or services is called barter. comparative advantage. absolute advantage. a production possibility. What function do cones have?cones help with near nearsightednesscones help with night visioncones help with far sightednesscones help with color distinction The volume of a large aquarium is 210 ft3 . It is 5 ft wide and 6 ft high. What is the length of the aquarium? A ball is dropped out of a window and hits the ground at 14.5 m/s. How long did it take to fall to the ground? Write the exponential function