Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
By What Percent Does The Current Through A Change When The Switch Is Closed?
By What Percent Does the Current Through a Change When the Switch Is Closed? Answer: The percentage change in closing the switch the total heat dissipated per unit time is 50%. when the four resistors are connected of 2 ohms,3 ohms,4 ohms, and 9-ohm resistance and 20 V is a The direction of the flowRead more
By What Percent Does the Current Through a Change When the Switch Is Closed?
Answer:
The percentage change in closing the switch the total heat dissipated per unit time is 50%. when the four resistors are connected of 2 ohms,3 ohms,4 ohms, and 9-ohm resistance and 20 V is a
The direction of the flow of current is from the power source to load. The function of load is to convert this electric energy into another form of energy while light bulbs convert electrical energy to heat energy. In a complete circuit when the switch is closed the current from the source of power will proceed through the load. In the circuit, if there is some breakage closed the switch does not transfer the current to the load. The breakage may be occurred in conducting wire or in the filament of the bulbs. While in an open circuit current does not flow in wires from one end of the source to another end. Light does not turn on because there is no flow of current.
For example:
In 1 ohm resistor, the initial current when the switch is closed is 4 Ampere. When three resistors are connected 1 ohm, 3 ohm, and 6 ohms. The total voltage applied is 12 V. the parallel resistors are 3 and 6.
The equivalent resistance is Req= 6×3/6+3 = 2ohm
The current flow through the 1-ohm resistor is 12/1+2 =4 A
When the switch closed the current flow through the circuit how much current flow depends on the resistance of resistors and voltage because the current and resistance are inversely related and current and voltage are directly related.
See lessA Processor Housing That Contains More Than One Processor Is Referred To As What Term?
A Processor Housing That Contains More Than One Processor Is Referred To As What Term? Multicore processing Multithread processing Multiprocessing processor Multihoused processor Answer: A processor housing that contains more than one processor is referred to as the multicore processor. Multicore prRead more
A Processor Housing That Contains More Than One Processor Is Referred To As What Term?
Answer:
A processor housing that contains more than one processor is referred to as the multicore processor.
Multicore processing:
A multicore processor is a chip multicore processor or CMP. It is a single integrated circuit that holds multiple core processing units. Mostly t is also known as the core. There are many multicore processors which vary from each other in terms of the number of cores, types of cores, isolation, cores interconnection, and the number of caches and level of caches.
There is a different multicore processor that has a different number of cores like a quad-core processor containing four cores. The number of cores is usually represented as a power of two.
Types of cores:
There are two types of cores in which it is placed one is homogenous core and another one is heterogeneous core.
Homogenous core:
In symmetric core, all the processing units in the homogenous core are of the same type. Central processing units slide the multicore processing unit.
Heterogeneous cores:
In asymmetric core, all multicore processors in it have different types of core and it runs different systems. The graphic processing unit includes in the heterogeneous core.
Interconnected cores:
A multicore processor is different from each other based on how cores are interconnected or bud architectures.
No.and level of caches:
The multicore processing unit is also different in its construction and data caches.
Isolation:
There are two types of isolation includes.
Physical:
In which different cores do not enter the same physical hardware. For example, memory locations like RAM and caches.
Temporal:
It makes sure that the implementation of software on one core does not influence the temporal behavior of software that runs on another core.
An ongoing trend in multicore processing:
It replaced the traditional and single-core processing unit which is why nowadays single cores are produced. Multicore processors are more common in the latest world like a computer on-chip processor. It saturated large application domains like data warehousing and online shopping. A multicore processor is popular for its size, power, and weight in which high performance is required.
See lessWhat Command Is Used To Manage A Software Raid Configuration After Installation?
What Command Is Used to Manage a Software Raid Configuration After Installation? Answer: Mdadm is used to manage software raid configuration after installation. Mdadm: This is a Linux utility that checks and monitors software RAID devices. It is in place of older RAID software like raid tools or raiRead more
What Command Is Used to Manage a Software Raid Configuration After Installation?
Answer:
Mdadm is used to manage software raid configuration after installation.
Mdadm:
This is a Linux utility that checks and monitors software RAID devices. It is in place of older RAID software like raid tools or raidtools2 modern Linux distributions are used. Originally it is a free software maintained and copyrighted to Neil Brown of SUSE. It is licensed in terms of version 2 or by GNU general public license.
Mdadm name is derived from MD means multiple device nodes it manages and changes the previous utility mdctl. Mirror disk was its original name but it changed because more functions are added to it. The full form of Mdadm is multiple disks and device management. Anything presented in the Linux kernel in terms of a block device is included in Linux software RAID configurations. Whole hard drives and partitions are included in it.
RAID configurations:
The full form of RAID is (a redundant array of independent disks or a redundant array of inexpensive disks). It consists of the basic set of RAID configurations that recruit the striping, mirroring, and parity technique to develop a large data store from hard disk drives. RAID 0(striping) RAID 1 (mirroring), RAID 5 (distributed parity), RAID 6 (dual parity) are different types of RAIDS. In the storage networking industry Association (SNIA) levels of RAID and standard data, formats are standardized in it by common (DDF) RAID Disk Drive Format. The numerical values used are only specified as identifiers not signify performance, generation, or any other metrics. RAID 10 striping of mirror set. It is different from RAID 0 and 1 which contains a high-performance mirror and in RAID 0 stripes across the physical hard disk. In RAID 10 a single failure results due to lower-level mirrors entering degraded mode and the top-level mirror entering mode. Which setup is preferable to depend on the applications whether spare disk available or not.
See lessWhat Is The Maximum Length Of Cable On A 100baset Network?
What Is the Maximum Length of Cable on A 100baset Network? Answer: The maximum cable length on a 100base network is 100 meters or in meters is 328 feet. A 100baset Network: Fast Ethernet in computer networking has physical layers that transfer traffic at the official rate of 100mbit/s. Previous inteRead more
What Is the Maximum Length of Cable on A 100baset Network?
Answer:
The maximum cable length on a 100base network is 100 meters or in meters is 328 feet.
A 100baset Network:
Fast Ethernet in computer networking has physical layers that transfer traffic at the official rate of 100mbit/s. Previous internet speed was 10Mbit/s.100 base-T is the fastest and most common Ethernet physical layer. Before the foundation Of Gigabit Ethernet, Fast Ethernet is the fastest version of Ethernet for three years. It passes on twisted pair of cables or optical fiber cable.
10BASE-T is an advancement of 10BASE5 and 10BASE2. Fast Ethernet is generally suited with the previous 10BASE-T systems it is advanced from 10BASE-T by enabling plug-and-play. Auto negotiations can be performed by most switches and networking devices by ports with efficient Fast Ethernet. If 10BASE-T equipment does not perform auto-negotiation itself then set the ports to 10 BASE-T half-duplex. Full-duplex is also defined and used today, all modern devices use Ethernet Switches and run in full-duplex mode. But the legacy devices that use half-duplex are still present.
The media-independent interface increases the maximum data bit rate for all types of Fast Ethernet versions to 100 Mbit/s. On real networks, it is observed that the information rate is less than the theoretical maximum due to on every Ethernet frame the necessary addressing and error detection and interpacket gap present between the transmission.
100BASE-T is a twisted pair cable. It has specific Fast Ethernet standards including 100BASE-TX (100 Mbit/s over Cat5),100 BASE-T4 (100Mbit/s over four pairs of better cable).100BASE-T2(100Mbit/s above two pairs of Cat3). 100BASE-T cable segments length is 100 meters and 328 ft. all the 100BASE-T attachments are 100 BASE-TX.
- 100BASE-TX
- 100BASE-T1
- 100BASE-T2
- 100BASE-T4
See lessWhat File Under The /Etc Folder Contains The Hashed Passwords For A Local System?
What File Under The /Etc Folder Contains the Hashed Passwords for A Local System? Answer: The file in the Etc folder contains hashed passwords for a local system is shadow. Hashed password: Hashed is directional encryption. It means that from hash you cannot obtain the original text back. It is suggRead more
What File Under The /Etc Folder Contains the Hashed Passwords for A Local System?
Answer:
The file in the Etc folder contains hashed passwords for a local system is shadow.
Hashed password:
Hashed is directional encryption. It means that from hash you cannot obtain the original text back. It is suggested to store the security information and passwords in the hashed format in this way the security system can verify the password entered is correct or not. By hashing the password, it is difficult to steal information. For example, you have a Facebook account. Facebook never tells your password. It only verifies whether the entered password is correct or not. This Facebook, application save your password so when you enter the password it can match either it is the same as you entered already. It can hash because the password can be copied.
Let’s assume your password is “Batman” when you run it on hashing algorithm it gives random strings like “Bruce”. Now Facebook remembers only Bruce and forgets Batman. When you entered the password “batman” Facebook starts hashing and matches the result is “Bruce” or not. On the base of this, it gives access or denies you. So, it is directional encryption. It cannot be decrypted. If your Facebook is hacked by someone and get the password file but cannot be able to look correct hash for that password. He will be stuck in random-looking hashes.
Shadow file:
Shadow is also known as shadow password file. It is responsible for storing one-way encrypted user passwords and it gives access only to the users. It is a system file in Linux. It avoids the access of unauthorized users from entering into the system. Sysadmins and developers need to eliminate and search malfunctioning elements from user accounts.
Types of hashing:
Hashing has many different types like RipeMD, hash, and tiger. MD5, SHA-2, and CRC32 are the common type of hashing. MD5 is responsible for encoding the information and putting it into code of 128-bit fingerprint. It is mostly used in Etc shadow files. Login passwords are stored and hashed in Linux distributions with the assistance of the MD5 logarithm.
See lessIn Relation To A Computer, What Do The Letters Cpu Stand For?
In Relation to A Computer, What Do the Letters CPU Stand For? CPU stands for the central processing unit. It is part of every digital computer system. It is composed of the control unit, main memory, and arithmetic-logic unit. It’s also called the central heart of the entire computer system becauseRead more
In Relation to A Computer, What Do the Letters CPU Stand For?
CPU stands for the central processing unit. It is part of every digital computer system. It is composed of the control unit, main memory, and arithmetic-logic unit. It’s also called the central heart of the entire computer system because it is interconnected to outer equipment like input, output devices, and additional storage units. With the advancement in technology, central processing units in modern computer systems contain microprocessors like (ICC) Integrated circuit chips.
Composition of the central processing unit:
With time designs, forms, and applications of CPU change but their basic operation remains unchanged. The main components include (ALU) arithmetic logic unit that performs functions like logic and arithmetic operations, processor register that store the results of arithmetic logic unit. The Control unit organizes the fetching from memory. In the modern system, it contains a microprocessor chip with many CPUs are called a multi-core processor. The processor core of individual CPUs can also be multiprocessor to create additional logical CPUs. Multiple processors that run in parallel with no central unit are called vector or array processors.
Operation of CPU:
The basic operation of most of the CPUs is to execute the stored information called program. The information or instruction that can be executed is stored in memory. The term instruction cycle is used in all central processing units because all CPUs can fetch, decode and execute steps during their operation. The whole process repeats after the execution of the next instruction cycle fetch the next sequential instruction. Steps for the operation of the central processing unit are.
The function of the Central processing unit:
These are the following function of the central processing unit as given below
- A logic operation like comparison of data and selection of procedure for solving the desired problem or a feasible alternative depends on fixed criteria.
See lessWhat Is The Primary Advantage Of A Caching-Only Dns Server?
What Is the Primary Advantage of a Caching-Only Dns Server? Answer: The primary advantage of a caching-only DNS server is to speed DNS queries by building a DNS request cache. A caching-only DNS server reduces the departing DNS traffic and speeds up the named purpose. It takes queries from customersRead more
What Is the Primary Advantage of a Caching-Only Dns Server?
Answer:
The primary advantage of a caching-only DNS server is to speed DNS queries by building a DNS request cache. A caching-only DNS server reduces the departing DNS traffic and speeds up the named purpose. It takes queries from customers and accomplishes the queries in opposition to other name servers caching the results. When it is performed returns these results to the client or customer. This is the basic advantage of caching-only DNS servers to reduce the traffic and increase the resolution of names. Caching servers have the benefit of answering the queries from clients.
Caching only DNS server:
A caching-only DNS server means in which required all DNS information from other DNS servers. It does not proceed with a zone transfer and also does not store information of host inn domain files. At least one root server must DNS server has.
Domain name system:
In the domain name system, it gives you permits by entering into human devices hostnames rather than IP addresses. It develops a mapping in its IP addresses and between domain names. DNS holds these mapping. Reliable and meaningful domain names translate into IP addresses by domain name system for networking equipment to discover these devices. Domain names are the basic advantage of a domain name system are.
Domain Name System cache resolves the name of the domain to an IP address. It speeds up the process by reducing traffic but it can compromise in webpages if not properly managed.
See lessWhat Is The Name For A Small Device That Connects To A Computer?
What Is the Name for A Small Device That Connects to A Computer? Modem Dongle Pen drive Webcam Answer: The dongle is a small device that connects to a computer. Dongle: The dongle is also called an adapter It is portable computer hardware that attaches to a part of the computer. It has one or more bRead more
What Is the Name for A Small Device That Connects to A Computer?
Answer:
The dongle is a small device that connects to a computer.
Dongle:
The dongle is also called an adapter It is portable computer hardware that attaches to a part of the computer. It has one or more built-in sections. It has the advantages of these sections that at the same time plug more devices into the computers. It is very useful where internet access is not guaranteed like using laptops in airports, taxis, or even cafes. It can be used where Wi-Fi is not accessible. It also comes in a portable size or is handy you can use when traveling or staying in a new place. For data-heavy activities like streaming, it does not provide the best connection.
Working:
The benefits of the dongle extend to its arrangements. dongles in mobile offer with a data plan. Just by inserting it into a computer or laptop, it provides access to your provider’s mobile data network.
Advantages and disadvantages:
Dongles have some benefits. But it is not always the best option for an internet connection.
Advantages:
Disadvantages:
Alternatives for dongles:
- Wi-Fi hotspot
- Wi-Fi
- Mobile home broadband.
See lessWhat File Holds The Preferences And Settings Of The Currently Signed-In Userc?
What File Holds the Preferences and Settings of The Currently Signed-In User? Answer: The file holds preferences and the setting of the currently signed-in user is HKEY-CURRENT-USER(HKCU). Window registry: It is a graded database that is responsible for storing low-level settings (it is concerned wiRead more
What File Holds the Preferences and Settings of The Currently Signed-In User?
Answer:
The file holds preferences and the setting of the currently signed-in user is HKEY-CURRENT-USER(HKCU).
Window registry:
It is a graded database that is responsible for storing low-level settings (it is concerned with an independent component within the system and its operation) for Microsoft Windows operating functions and applications that use the registry. Window Registry is used by services, device drivers, security account managers and kernels, user interfaces. It is also responsible for counters for profiling system performance. Hardware in all versions of the Microsoft Windows operating system the window registry contains information, setting, and other uses for programs. For example, when the program is installed a new key setting like the location of the program, version, and how to use the program all these information’s are included in the window registry.
Key and values:
The window registry has two basic elements keys and values. Registry keys accommodate objects like folders. Registry values accommodate non-objects like files. Key may also contain subkeys and values. To specify hierarchy key levels, use backlashes and must have a non-backlash sensitive name.
There is a total of seven root keys named on their application or constant handles described in Win 32 API.
HKCU:
It stores the setting that is particular to the currently logged-in user. It is a link to a subkey of HKEY_USERS that communicates to users, in both locations same information is available. (HKU)\(SID)\ is referenced to the specific subkey, (SID) communicate to window SID. On window NT system NTUSER.DAT in which every user setting is stored in this file and in USRCLASS.DAT in which inside the documents there are setting subfolders.
See lessWhat Are The Six Steps That You Can Use To Solve Any Computer Problem?
What Are the Six Steps That You Can Use to Solve Any Computer Problem? Answer: Backup data and interview the users Examine the system and generate possible solutions Evaluate your theory Decide on the solution and implement on it Solution implementation and take preventive measures Judge the outcomeRead more
What Are the Six Steps That You Can Use to Solve Any Computer Problem?
Answer:
Pros of six-step problem solving:
Problem-solving models discourse the problems and challenges happening in the workplace. Regularly different are looking to solve the problem every person has their approach to solving the problem and finding its solution.
Step one: problem identification
Step one identifies the problem’s context background and the causes of the issue. Once discover the real problem, they examine the broad symptoms of these problems. What causes these effects and how do resolve the symptoms. All groups use these techniques like
step two: the root cause of the problem
After the first step, PS groups find the cause of the problem. Problem-solving groups use the technique like
step three: theory evaluation
Problem-solving groups focused on;
Step four: select the best solution:
In the fourth step, all of the possible solutions selects the best solution by a focus on these points
Step five: implementation
When the solution is selected then implemented the solution project planning start
Step six: outcome evaluation:
The solution implementation needs to be monitored to ensure that their suggestion is followed. Like milestones and costs are attained.
See less