the null hypothesis, h0, is: no more than 90% of homes in the city are up to the current electric codes. and the alternative hypothesis, ha, is: an electrician claims more than 90% of homes in the city are up to the current electric codes. what is the type ii error in this scenario? select the correct answer below: the electrician cannot conclude that no more than 90% of homes in the city are up to the current electrical codes when, in fact, no more than 90% of the homes are up to the current electric codes. the electrician cannot conclude that no more than 90% of homes in the city are up to the current electrical codes when, in fact, more than 90% of the homes are up to the current electric codes. the electrician cannot conclude that more than 90% of homes in the city are up to the current electrical codes when, in fact, no more than 90% of the homes are up to the current electric codes. the electrician cannot conclude that more than 90% of homes in the city are up to the current electrical codes when, in fact, more than 90% of the homes are up to the current electric codes.

Answers

Answer 1

The type II error in this scenario is when the electrician cannot conclude that more than 90% of homes in the city are up to the current electrical codes.

When, in fact, no more than 90% of the homes are up to the current electric codes. In other words, the electrician incorrectly fails to reject the null hypothesis and accepts the alternative hypothesis when it is false. This means that the electrician falsely claims that more than 90% of homes are up to the current electric codes when they are not. A Type II error occurs when one fails to reject the null hypothesis (H0) when the alternative hypothesis (Ha) is true. In this scenario, the null hypothesis states that no more than 90% of homes in the city are up to the current electric codes. The alternative hypothesis claims that more than 90% of homes in the city are up to the current electric codes.

In this case, a Type II error would happen if the electrician cannot conclude that more than 90% of homes in the city are up to the current electrical codes when, in fact, more than 90% of the homes are up to the current electric codes. This means that the electrician wrongly accepts the null hypothesis, potentially missing opportunities to improve electrical safety in the city. Therefore, the correct answer is: the electrician cannot conclude that more than 90% of homes in the city are up to the current electrical codes when, in fact, more than 90% of the homes are up to the current electric codes.

To know more about scenario visit:-

https://brainly.com/question/4878870

#SPJ11


Related Questions

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?

Answers

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

The Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

ICMP (Internet Control Message Protocol) is a protocol that produces error messages to the Internet protocol address.

This error reporting protocol (ICMP) is used for diagnostics and network management.

Any network device using TCP/IP can send, receive, and/or process ICMP messages.

In conclusion, the Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

Learn more in:

https://brainly.com/question/6265069

A _____ is a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam.

Answers

A large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam is called; botnet

To answer this question, we need to first define an internet bot. An Internet bot is simply defined as a software application that runs tasks in an automated manner over the Internet.

Now, a number of connected internet devices that run one or more bots is referred to as a botnet and this botnet tends to control tasks on the infected computers without the user's knowledge.

Read more on botnets at; https://brainly.com/question/13624552

3.5 code practice
grade = str(input("What year of high school are you in?: "))

if ("grade ==Freshman"):

print("You are in grade: 9")

elif ("grade == Sophomore"):

print("You are in grade: 10")

elif ("grade == Junior"):

print("You are in grade: 11")

elif ("grade == Senior"):

print("You are in grade: 12")

else:

print("Not in High School")

It keeps printing your are in grade 9. Why?

Answers

The fixed code is shown below. input() function already returns string that's why you don't have to convert string again. Also the syntax in if-else scope is wrong.

grade = input("What year of high school are you in?: ")

if(grade.lower()=="freshman"):

print("You are in Grade 9.")

elif(grade.lower()=="sophomore"):

print("You are in Grade 10.")

elif(grade.lower()=="junior"):

print("You are in Grade 11.")

elif(grade.lower()=="senior"):

print("You are in Grade 12.")

else:

print("Wrong input!")

What type of scaling is each of these?
horizontal or vertical
adding a server:

adding memory to a server:

Answers

Answer:

Adding a server: Horizontal Adding memory to a server: Vertical

Explanation:

Answer:

adding a server: horizontal

adding memory to a server: vertical

Explanation:

edge 2022

State true or false: for every high level language, there are certain grammatical rules, violation of which a comp

Answers

true pls make me brainlyest

Software developers_____their programs, while buyers only own the right to____use the software.

Answers

The majority of software works are copyright protected, which means that in order to use the software in any way, you must first obtain a license from the developer or other copyright holder.

How is using a piece of software sanctioned legally?The majority of software works are copyright protected, which means that in order to use the software in any way, you must first obtain a license from the developer or other copyright holder. Public domain products, on the other hand, are not protected by copyright; anybody is free to alter and utilize such software.The software application may be made available to users for a one-time price in exchange for ownership rights. It is generally accepted that this strategy—purchasing the license up front and acquiring the right to use the software perpetually—is the conventional method of owning software. Perpetual licenses are a particular kind of buying agreement.              

To learn more about software refer to:

https://brainly.com/question/28224061

#SPJ1

I need help I did not mean to do that to my computer

I need help I did not mean to do that to my computer

Answers

Answer:

Man...I don't think you can fix that yourself..

paanswer po number 1, 2, 4, 6, 9, 15, 19 tyyyy​

paanswer po number 1, 2, 4, 6, 9, 15, 19 tyyyy

Answers

Answer:

I hope it helps you

Explanation:

Pls do let me know if any doubt

paanswer po number 1, 2, 4, 6, 9, 15, 19 tyyyy
paanswer po number 1, 2, 4, 6, 9, 15, 19 tyyyy

A school is conducting a survey of students to learn more about how they get to school. Students were asked how they travel to school, how long it takes them to get to school, what time they arrive at school, and for a description of their most significant challenges when traveling to school. Several rows of the data collected are shown in the table below.
Which column is data will likely be most difficult to visualize or analyze?
A. How Travel
B. How Long
C. Time Arrive
D. Biggest Challenges

Answers

Answer: D.

Explanation: I can't say this is the correct answer for sure since the chart is not there but I'm pretty sure the answer is D. This video might help you out on the subject. https://youtu.be/dQw4w9WgXcQ

The column in which the data will likely be most difficult to visualize or analyze is Biggest Challenges. The correct option is D.

What is survey?

A survey is a research method that involves gathering information from a group of people through the use of pre-designed questions or structured interviews.

A survey's purpose is to collect information about people's opinions, beliefs, attitudes, behaviors, or experiences on a specific topic.

Biggest Challenges is the column in which the data will most likely be difficult to visualize or analyze.

The table's other columns, How Travel, How Long, and Time Arrive, all contain quantitative data that can be easily visualized and analyzed.

The How Travel column, for example, could be represented by a pie chart or bar graph depicting the percentage of students who walk, bike, drive, or take the bus to school.

Thus, the correct option is D.

For more details regarding survey, visit:

https://brainly.com/question/17373064

#SPJ3

Distinguish between the physical and logical views of data.
Describe how data is organized: characters, fields, records,
tables, and databases. Define key fields and how they are used to
integrate dat

Answers

Physical View vs. Logical View of Data: The physical view of data refers to how data is stored and organized at the physical level, such as the arrangement of data on disk or in memory.

It deals with the actual implementation and storage details. In contrast, the logical view of data focuses on how users perceive and interact with the data, regardless of its physical representation. It describes the conceptual organization and relationships between data elements.

In the physical view, data is stored in binary format using bits and bytes, organized into data blocks or pages on storage devices. It involves considerations like file structures, storage allocation, and access methods. Physical view optimizations aim to enhance data storage efficiency and performance.

On the other hand, the logical view represents data from the user's perspective. It involves defining data structures and relationships using models like the entity-relationship (ER) model or relational model. The logical view focuses on concepts such as tables, attributes, relationships, and constraints, enabling users to query and manipulate data without concerning themselves with the underlying physical storage details.

Data Organization: Characters, Fields, Records, Tables, and Databases:

Data is organized hierarchically into characters, fields, records, tables, and databases.

Characters: Characters are the basic building blocks of data and represent individual symbols, such as letters, numbers, or special characters. They are combined to form meaningful units of information.

Fields: Fields are logical units that group related characters together. They represent a single attribute or characteristic of an entity. For example, in a customer database, a field may represent the customer's name, age, or address.

Records: A record is a collection of related fields that represent a complete set of information about a specific entity or object. It represents a single instance or occurrence of an entity. For instance, a customer record may contain fields for name, address, phone number, and email.

Tables: Tables organize related records into a two-dimensional structure consisting of rows and columns. Each row represents a unique record, and each column represents a specific attribute or field. Tables provide a structured way to store and manage data, following a predefined schema or data model.

Databases: Databases are a collection of interrelated tables that are organized and managed as a single unit. They serve as repositories for storing and retrieving large volumes of data. Databases provide mechanisms for data integrity, security, and efficient data access through query languages like SQL (Structured Query Language).

Key Fields and their Role in Data Integration:

Key fields are specific fields within a table that uniquely identify each record. They play a crucial role in integrating data across multiple tables or databases. A key field ensures data consistency and enables the establishment of relationships between tables. There are different types of key fields:

Primary Key: A primary key is a unique identifier for a record within a table. It ensures the uniqueness and integrity of each record. The primary key serves as the main reference for accessing and manipulating data within a table.

Foreign Key: A foreign key is a field in a table that refers to the primary key of another table. It establishes a relationship between two tables by linking related records. Foreign keys enable data integration by allowing data to be shared and referenced across different tables.

By utilizing primary and foreign keys, data from multiple tables can be integrated based on common relationships. This integration allows for complex queries, data analysis, and retrieval of meaningful insights from interconnected data sources.

Learn more about memory here

https://brainly.com/question/28483224

#SPJ11

Assume you previously entered these lines of code.
>>> a = 3
>>> b = 2
>>> c = 0

Which lines of code below generate errors? Select 2 options.

result = a * b - c / (a + c)
result = a * b - c / b
result = ab + bc
result = a * b - b / c
result = a * b - b / (c + b)

Answers

Answer:

The correct answer is result = a * b - b / c and result = ab + bc or A and D.

Explanation:

I just took the quiz and got it correct.

Answer:

A and D

Explanation:

trust

the critical path of a network is the part 2 a. path with the fewest activities. b. path with the most activities. c. longest time path through the network. d. shortest time path through the network.

Answers

The critical path of a network is the part option. c. longest time path through the network.

What is the critical path of a network?

In regards to project management, a critical path is known to be the way or sequence of project network functions that is known to add up to form one of the  longest total timeframe even if that longest timeframe has float or not.

This is know  to be the factor that helps to determines the shortest time that is known to be possible to finish  the project.

Therefore, The critical path of a network is the part option. c. longest time path through the network.

Learn more about critical path from

https://brainly.com/question/14728281

#SPJ1

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

This operating system was used by individual computers and required users to type commands.

Answers

Answer:

MS-DOS is your answer

Explanation:

Cual de las siguientes es una desventaja del uso de las computadoras?

A)Precision
B)Rapidez
C)Violacion ala privacidad
D)Confianilidad

Answers

Answer: c
Explanation:

30 points and brainiest Which certifications are offered in Family Consumer Science? (Select 2) Select 2 correct answer(s)
Question 2 options:

Community Health Worker

Early Childhood Education

Food Handler's

Counseling

Answers

The certifications are offered in Family Consumer Science are option B and C:

Early Childhood EducationFood Handler's

What is the certifications  about?

Family Consumer Science is a field that focuses on the study of how families interact with the broader community and economy. Some of the certifications offered in Family Consumer Science include:

Early Childhood Education: This certification is designed for individuals who wish to work with young children, typically from birth to age 8, in settings such as preschools, daycare centers, and primary schools. It covers topics such as child development, teaching methods, and classroom management.

Therefore, in Food Service Management: this certification is designed for individuals who wish to work in the food service industry, such as managing and supervising food service operations in schools, hospitals, restaurants and other food service facilities.

Learn more about certifications   from

https://brainly.com/question/26004231
#SPJ1

Classification of computer Purpose personality ?​

Answers

Answer: Physiology, Performance, and Personality Characteristics.

Explanation: I think this is correct, sorry if it's not!!

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

What is the difference between a data warehouse and a data mart?

Answers

The primary distinction between the two databases is in their size and approach.

A data warehouse is a corporation's global database that saves data about any area of the organization, whereas a data mart stores a small amount of data relating to a specific business department or project. A data warehouse is a vast collection of data from numerous sources within a company, whereas a data mart is data derived from a data warehouse that belongs to a specific business component. Data marts make specialized data available to a designated group of users, allowing them to quickly obtain crucial insights without having to sift through a whole data warehouse.

Learn more about data here-

https://brainly.com/question/11941925

#SPJ4

Use the drop-down menus to explain how Angelina
should complete this process.
What is her next step?
What should she do next?
What should she do last?

Answers

Answer: what is her next step: click page number

What should she do next: click current position

What should she do last: click plain number 1

Explanation:

Answer:

A, C, B

Explanation:

Read the scenarios below, then use the drop-down menus to decide if you should use a database.

A. The parent-teacher organization keeps a log of cookie sales to raise money for the elementary school.
B. A company created a website where people can buy books, movies, electronics, and household items.
C. A national restaurant chain with over two hundred locations needs to keep track of a large volume of information, including food suppliers, employees, and customer orders.
D. You created a spreadsheet to keep track of your favorite books.

Answers

Answer:

A. The parent-teacher orginization keeps a log of cookies sales to raise money for the elementary school.

Explanation:

A company created a website where people can buy books, movies, electronics, and household items needs a database.

What is a database?

The other is:

A national restaurant chain with over two hundred locations needs to keep track of a large volume of information, including food suppliers, employees, and customer orders needs a database.

A database is known to be a well plan out collection of information, or data, that are said to be structurally saved electronically using a computer system.

Note that the two scenario above such as company created a website where people can buy books, movies, electronics, and household things that needs a database because its work is complex.

Learn more about database from

https://brainly.com/question/26096799

#SPJ2

Create an infographics using the Word Processing Software, informing the audiences about internet safety practices.

Answers

Here is a suggested infographic on internet safety practices using Microsoft Word:

[A Word document shows the following infographic:]

Staying Safe Online

Protect your personal information. Never share your name, address, phone number, passwords, or Social Security Number on social media or public websites.

Be wary of phishing emails and malicious links. Never click links or download attachments from unknown or untrusted sources. Legitimate companies will not ask for sensitive data via email.

Use strong and unique passwords. A strong password contains a minimum of 8 characters, a mix of letters, numbers and symbols, and is not based on personal information. Use different passwords for different online accounts.

Be cautious of what you post. Anything you post online can potentially last forever. Do not post anything that you would not want seen by anyone.

Turn on two-factor authentication whenever possible. This adds an extra layer of security for your accounts like email, social media, and cloud storage services.

Ensure all devices and software are up to date. Install the latest updates to keep security patches current to protect against threats.

Be wary of public Wi-Fi networks. Public networks are not secure and all your online activity and information can be visible to others. Avoid conducting sensitive activities on public Wi-Fi.

Signal for help if anything suspicious happens. If you notice any suspicious activity on your accounts or devices, changing passwords or unauthorized logins, report it immediately to the concerned companies and consider filing a police report.

Online privacy and security is a shared responsibility. Be proactive and spread awareness about internet best practices to help keep everyone safe online. Together, we can make the internet a safer place!

Does this infographic look okay? I tried to highlight some key best practices around protecting personal information, using strong passwords, being cautious of what is posted online, enabling two-factor authentication, keeping software up to date, avoiding public Wi-Fi and knowing how to get help if needed. Please let me know if you would like me to modify anything in the infographic. I can also suggest some other topics or formatting styles if required.

A brief overview of some important internet safety practices that you can include in your infographic  using the Word Processing Software is given.

How to explain the information

Use strong passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols in your passwords, and avoid using personal information.

Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring a second form of authentication in addition to your password.

Be careful with personal information: Don't share personal information like your full name, address, phone number, or social security number online.

Learn more about Word Processing on

https://brainly.com/question/985406

#SPJ1

Which is not a valid identifier?
a.firstName
b.first_name
c.1stName
d.name1

Answers

based on the declared fact. 1stName is an invalid identification.

What is a valid identifier?

Underscores, numerals, and letters—both capital and lowercase—can all be used to identify a valid object. An identifier's first letter must either be a letter or an underscore. The following terms cannot be used as identifiers: int, while, etc.

Which of these is an invalid identifier?

A valid identification must contain the letters [A-Z] or [a-z] or the numerals [0-9], as well as an underscore (_) or a dollar sign ($). For instance, is not a valid identifier since it contains the special letter . An identification shouldn't contain any spaces. Java tpoint, for instance, is a bad identifier.

To know more about valid identifier visit:

https://brainly.com/question/30617145

#SPJ1

Assuming zero transmission time for the HTML object, how much time (in msec) elapses from when the client clicks on the link until the client receives the object? (hint Note that 2 RTTHTP are needed to fetch the HTML object and don't forget DNS delay)

Answers

Assuming zero transmission time for the HTML object, the time that elapses from when the client clicks on the link until the client receives the object is 2RTT + DNS delay.

The 2 RTT HTTP are needed to fetch the HTML object. Therefore, the answer is 2RTT + DNS delay (in msec). This means that it will take 2 Round Trip Times (RTT) and DNS delay to fetch the HTML object from the server. The RTT is the time it takes for a packet to travel from the client to the server and back again.

The DNS delay is the time it takes to look up the IP address of the server that hosts the HTML object, using the domain name in the URL.

Learn more about zero transmission: brainly.com/question/30574835

#SPJ11

you have the following code. how would you call the add_num() function?

Answers

When two objects are called + on in Python, the __add__() method defines what happens. Obj1 is essentially called when Obj1 + Obj2 is called (obj2). Int implements the __add__() method in the background, which is why this works.

What purposes does Python serve?

Python is a popular programming language for computers that is used to create software and websites, automate processes, and analyse data. Python is a general-purpose language, which means that it may be used to make a wide range of programmes and isn't tailored for any particular issues. Being a programming language that stresses readability, Python can be regarded as beginner-friendly because it is simpler to comprehend and use. As a result of its syntax's resemblance to the English language, it is simple for new programmers to dive right into the realm of development.

Know more about  method Visit:

https://brainly.com/question/30076317

#SPJ4

There are dash types of symbols

Answers

Answer:

logo , pictogram, ideogram, icon, rebus, phonogram and typogram

Explanation:

they are forty symbols

21
Drag each tile to the correct box.
Match the top-level domains to the website descriptions
.com
.gov
.mil
.org
a website that sells computer hardware to large organizations
a website operated by the state of California
>
the website of the US Coast Guard
the website of a group of individuals who work toward protecting gray wolves
>
Reset
Next


21Drag each tile to the correct box.Match the top-level domains to the website descriptions.com.gov.mil.orga

Answers

Answer:

A website that sells computer hardware to large organizations --> .com

A website operated by the state of California --> .gov

The website of the US Coast Guard --> .mil

The website of a group of individuals who work toward protecting gray wolves --> .org

Explanation: I took the test and got it right ;)

A website that sells computer hardware to large organizations --> .com. A website operated by the state of California --> .gov. The website of the US Coast Guard --> .mil. The website of a group of individuals who work toward protecting gray wolves --> .org

What is the government website?

The government website is the official US government website and is used for a domain name that is based on the word government. It is administrated by the cyber security and infrastructure security agency.

It is sponsored top level domain and only the US government is federal govt uses such websites.a website that sells computer hardware to large organizations a website operated by the state of California.

The website of the US Coast Guard the website of a group of individuals who work toward protecting gray wolves. a website that sells computer hardware to large organizations a website operated by the state of California.

Therefore, A website that sells computer hardware to large organizations --> .com. A website operated by the state of California --> .gov. The website of the US Coast Guard --> .mil. The website of a group of individuals who work toward protecting gray wolves --> .org

Find out more information about the driver's license on:

brainly.com/question/13112961

#SPJ2

Fill in the missing functions:
average(region): Takes a region of an image and returns the average red, green, and blue values across the region.
setRegion(region,r,g,b): Takes a region of an image and red, green, and blue values, r, g, b. Sets the region so that all points have red values of r, green values of g, and blue values of b.

Answers

The missing functions are average(region) and setRegion(region,r,g,b). The function average(region) takes a region of an image as input and returns the average red, green, and blue values across that region.

This function can be used to find the average color of a specific area of an image. The setRegion(region,r,g,b) function, on the other hand, takes a region of an image and red, green, and blue values (r, g, b) as input. This function sets the region so that all points within the region have red values of r, green values of g, and blue values of b.

This function can be used to change the color of a specific area of an image to a specific RGB value. Both functions are useful in image processing applications where color information needs to be extracted or altered in a specific region of an image.

To know more about average visit:

https://brainly.com/question/31384514

#SPJ11

ScootALot is a scooter rental service. At the end of each day, they hire contractors to pick up scooters and distribute them optimally around the city. The distribution algorithm considers all the possible locations for the scooters, compares that to the density of customers, and comes up with the optimal location for each scooter. As the company becomes more popular, they realize their algorithm is taking an unreasonable amount of time to come up with optimal scooter locations. What is the best way to improve the run time of the algorithm

Answers

Answer: Use a heuristic-based algorithm that suggests good locations for the scooters.

Explanation:

The best way to improve the run time of the algorithm is to use a heuristic-based algorithm as this will help in suggesting good locations for the scooters.

By using the heuristic based approach, there'll be a ranking based on available information which will then be used to suggest the locations that are good for the scooters. Its main objective is to give a solution which is vital in solving a particular problem based on the timeframe.

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___

Answers

Answer:

Ram or random access memory

Explanation:

Other Questions
is britannica a reliable source It is important to consider the quality of the data being used when considering the accuracy of a conclusion. Incorrectly collected data or data that includes bias will cause a computer or a human to draw a faulty conclusion.Consider the data available from the most recent census, where the government collected demographic and financial information on all citizens. Which of the following would be the best things to consider from it? aWhere a local library was needed. bThe location of a major sports franchise. cWhere to offer immigration services. dWhich area to offer needs-based services. 1+ root2x + 1 = root2x + 8 2. Choose the word or phrase that best matches the word in italics. Jennifer was determined to succeed, so she mustered the courage to give her speech. braced collected dismissed wanted mustered is in italics In our course activity, we discuss the terms and concepts used to diagnose, explain, predict and modify group behavior. During that activity we studied REB. REB stands for..A.Reaction-Emotion-BehaviorB.Real, effective beingsC.Rational-Emotive-BehaviorD.The Rebel Model What issues and challenges will the US face in the future? 14. For O, given two tangent segments, determinethe value of x if mAX:toBO The graph represents the cost of renting a generator from a hardware store. What does the point (2, 50) mean in the problem situation? What is the exact value of Sine (7pi/12)? When time and temperature are not controlled for bacteria growth, it is known as Time/Temperature Abuse. True False Which of the following options have the same value as 60% and 94?A: 0.0694B: 0.694C: 5/394D: 6094E: 60/10094 Food Handlers should call in sick when ___________. - Save & Exit Practice Lesson: 8.5 Applications: Interest and Mixt...AnswerHow to enter your answer (opens in new window)Tutor4/8CorrectQuestion 6 of 8. Step 1 of 1GLydia has money in two savings accounts. One rate is 6% and the other is 12 %. If she has $500 more in the 12 % account and the total interest is $375, how much isinvested in each savings account?Send to Instructorat 6%at 12%4CLARISSA HANEYSkip1IncorrectTry SimilarKeypadKeyboard ShortcutsSubmit Answer QuestionMarc is building a gazebo and wants to brace eachcorner by placing a 8-inch wooden bracketdiagonally as shown. How far below the cornershould he fasten the bracket if he wants thedistances from the corner to each end of thebracket to be equal?(Round to the nearest tenth of an inch.) Challenge Yossi used to have a square garage with 230 ft2 of floor space. He recently built an addition to it. The garage is still a square, but now it has 50% more floor space. What was the length of one side of the garage originally? What is the length of one side of the garage now? What was the percent increase in the length of one side? predation in your own words!! 10) Write an insertion sort method to sort an array of String values (instead of an array of int values). Assume the array is an instance variable of the current class called list, and number is an int instance variable that stores the number of elements currently stored in list. According to loewen and myrdal (1944), racism and integration is? the ______ was a new way to solve problems and run research created during the scientific revolution.a) enlightenmentb) scientific methodc) heliocentric theoryd) renaissance Which one is greater1.22 or 1.02