20. The time for the disk arm to move the heads to the cylinder containing count
the desired sector is called

Answers

Answer 1

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The answer is the seek time.

The seek time is the time for the disk arm to move the heads to the cylinder containing the desired sector.


Related Questions

Which tasks can Kim complete using the Customize Ribbon dialog box? Check all that apply.

Rename existing ribbon tabs.
Rearrange ribbon commands.
Add a new main tab to the ribbon.
Add commands to existing groups.
Create new PowerPoint commands.
Add a new contextual tab to the ribbon.

Answers

Answer:

Its A, B, C, and F

Explanation:

On edg

Rename existing ribbon tabs, Rearrange ribbon commands, Add commands to existing groups and Add a new contextual tab to the ribbon.

What is PowerPoint presentation?

A PowerPoint presentation is a type of visual aid that creates a slideshow of information that can be presented to an audience using Microsoft PowerPoint software.

It is typically made up of a series of slides that include text, images, charts, graphs, and other multimedia elements to convey information to the audience.

Kim can complete the following tasks by using the Customize Ribbon dialog box:

Existing ribbon tabs can be renamed.Rearrange the commands on the ribbon.To existing groups, add commands.To the ribbon, add a new contextual tab.

Thus, Kim cannot use the Customize Ribbon dialog box to add new PowerPoint commands or a new main tab to the ribbon.

For more details regarding presentation ,visit:

https://brainly.com/question/14498361

#SPJ7

If you are wanting to change programs, when do you need to make this request?
a.To change programs, you must contact your advisor or counselor and complete the change of program application during an open application window.
b.You can change at any time; just email your advisor regarding the change.
c.You can never change programs.
d.You do not need to notify anyone. You just need to start taking courses for the desired program.

Answers

Answer:

If your discussing colleges and degrees, you cant take courses your not autorized to take.

So if you have one major and wish to change to another then you need to discuss with a student advisor or counseler so they can make the changes. They will also discuss which classes are necessary for your program of choosing, making sure all your requirements are completed.

Explanation:

What is the name of the file in which this
program is stored: public class myProgram
A. myProgram.class
B. myProgram.java
C. myProgram.jgrasp
D. myProgram.doc

Answers

Answer:

B

Explanation:

i’m an information technology  student and as I remember we used this  name

You are allowed to use up to 5 images from one artist or photographer without
violating Copyright laws

Answers

If it’s a true or false question, then I think it’s false because I’m pretty sure you have to give credit.

After modifying a numbered list in her presentation, Su notices the numbers and the text are too close to each other. She knows she can solve this issue by using the hanging indent marker. Unfortunately, the ruler is not visible in her PowerPoint workspace.

Which tab and command group should she use to access the ruler? (View, Show or Insert, Add-ins or Home, Paragraph)
After selecting the numbered list, in which direction should she drag the hanging indent marker to increase the space between the numbers and the text? (upward or downward or to the left or to the right)

Answers

Answer:

1. View, show

2. to the right

Explanation:

On edg

Answer:

1) View, Show

2) to the right

Explanation:

P5.30 Having a secure password is a very important practice, when much of our information is stored online. Write a program that validates a new password, following these rules: •The password must be at least 8 characters long. •The password must have at least one uppercase and one lowercase letter. •The password must have at least one digit. Write a program that asks for a password, then asks again to confirm it. If the passwords don’t match or the rules are not fulfilled, prompt again. Your program should include a function that checks whether a password is valid.

Answers

Answer:

def check_password(password):

   is_short = False

   has_uppercase = False

   has_lowercase = False

   has_digit = False

   

   if len(password) < 8:

       is_short = True

   

   for p in password:

       if p.isupper():

           has_uppercase = True

       if p.islower():

           has_lowercase = True

       if p.isdigit():

           has_digit = True

   

   if is_short == False and has_uppercase and has_uppercase and has_digit:

       return True

   else:

       return False

while True:

   password = input("Enter your password: ")

   password2 = input("Enter your password again: ")

   

   if password == password2 and check_password(password):

       break

Explanation:

Create a function named check_password that takes one parameter, password

Inside the function:

Initialize the is_short, has_uppercase, has_lowercase, and has_digit as False. These variables will be used to check each situation

Check the length of the password using len() method. If it is smaller than 8, set is_short as True

Create a for loop that iterates through password. Check each character. If a character is uppercase, set the has_uppercase as True (use isupper() function). If a character is lowercase, set the has_lowercase as True (use islower() function). If a character is a digit, set the has_digit as True (use isdigit() function).

When the loop is done, check the value of is_short, has_uppercase, has_lowercase, and has_digit. If is_short is False and other values are True, return True. Otherwise, return False

Create an indefinite while loop, that asks the user to enter password twice. Check the entered passwords. If they are equal and the check_password function returns True, stop the loop. This implies that both passwords are same and password is valid.

Bluetooth's pan are also known as______.​

Answers

Answer:

personal area network..??

Explanation:

RAM
Clear sel
19. Which computer memory is used for storing programs and data
currently being processed by the CPU?
Mass memory
RAM
O Neo-volatile memory

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

The correct answer is RAM.

RAM is used for storing programs and data currently being processed by the CPU.  So, the data in the RAM, can be easily accessible and processed by the CPU more fastly.

While Mass memory and neo volatile memory is not correct options. because these types of memory can stores a large amount of data but CPU fetch data from these memories into RAM. and, RAM can only be used by the CPU when performing operations.

Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time t, the next in-order packet that the receiver is expecting has a sequence number of k. Assume that the medium does not reorder messages. Answer the following questions: What are the possible sets of sequence numbers inside the sender’s window at time t? Justify your answer. What are all possible values of the ACK field in all possible messages currently propagating back to the sender at time t? Justify your answer.

Answers

Answer:

Follows are the solution to this question:

Explanation:

In point a:

N = Size of window = 4

Sequence Number Set = 1,024

Case No. 1:

Presume the receiver is k, and all k-1 packets were known. A window for the sender would be within the range of [k, k+N-1] Numbers in order

Case No. 2:

If the sender's window occurs within the set of sequence numbers [k-N, k-1]. The sender's window would be in the context of the sequence numbers [k-N, k-1]. Consequently, its potential sets of sequence numbers within the transmitter window are in the range [k-N: k] at time t.

In point b:

In the area for an acknowledgment (ACK) would be [k-N, k-1], in which the sender sent less ACK to all k-N packets than the n-N-1 ACK. Therefore, in all communications, both possible values of the ACK field currently vary between k-N-1 and k-1.

The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should Jim try first to resolve the issue?
A. Downgrade the email software to an older, previous version
B. Buy a newer email program and migrate the office computers to that program
C. Switch from open source software to proprietary software
D. Check for and install patches or software updates

Answers

Answer:

A

Explanation:

Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns their count (that is, how many there are) So if the input was:
hooligan sausage economy
ruin palatial
the function would return 5 because there are 5 strings there.

Answers

Answer:

The function written in C++

int str(string word) {

int count = 1;

for(int i =0; i<word.length();i++) {

 if(word[i] == ' ') {

  count++;

 }

}

return count;

}

Explanation:

This line defines the function

int str(string word) {

This line initializes count to 1

int count = 1;

This line iterates through the input string

for(int i =0; i<word.length();i++) {

This line checks for blank space

 if(word[i] == ' ') {

Variable count is incremented to indicate a word count

  count++;

 }

}

return count;

}

See attachment for full program

What output is produced by
this code?
System.out.print("Computing\nisInfun");
A. Computing is fun
B. Computing\nis\nfun
C.
Computing
is
fun
D. This code will not produce any output, it contains an error.

Answers

Answer:

The answer to this question is given below in the explanation section. the correct option is C.

Explanation:

This is Java code statement:

System.out.print("Computing\nisInfun");

The output of this code statement is

Computing

isInfun

However, it is noted that the C option is not written correctly, but it is guessed that it will match to option C.

This Java code statement first prints "Computing" and then on the next line it will print "isInfun" because after the word "Computing" there is a line terminator i.e. \n. when \n will appear, the compiler prints the remaining text in the statement on the next line.

Kim frequently saves her PowerPoint files in a different format. So, she decides to add a command for this action to the Quick Access Toolbar. Complete the steps to follow for this task.

1. Select a drop-down menu at the top of the screen.

2. Choose
from the Customize Quick Access Toolbar list.

3. A Quick Access Toolbar dialog box opens.

4. In the
section, select
.

5. Choose Save As Other Format.

6. Click the
button, and click OK.

Answers

Answer:

More Commands, Choose Commands from, All commands, Add

Explanation:

Correct on Edg

More Commands, Choose Commands from, All commands.

What is Commands?

One form of statement that tells someone what to do is a command. Additional sentence types include inquiries, exclamations, and declarations.

Usually, but not always, command phrases begin with an imperative (bossy) verb because they demand that the subject take an action.

Children should first learn about and be able to recognize the word classes noun, verb, adjective, and adverb before being taught commands. They can start working on instructions and the usage of imperative verbs after they are familiar with these.

Therefore, More Commands, Choose Commands from, All commands.

To learn more about Commands, refer to the link:

https://brainly.com/question/30319932

#SPJ3

in a blank excel workbook go to insert tab on the ribbon, which of the following is Not vailable 1 smart art 2 coloumns ( not coloumn chart) 3 shapes 4 pictures​

Answers

Answer:

hahahahahahahhahah

The rows that are not available in a blank excel workbook go to the insert tab on the ribbon.  The correct option is D.

What are ribbons?

Click the Ribbon Display Options icon in the document's upper right corner. The Minimize icon is to the left of it. To display the Ribbon with all tabs and all commands, select Show Tabs and Commands from the menu that appears.

Basic units known as cells are created by rows and columns in an Excel workbook. There are only a set number of rows and columns available for the workspace.

There are 1,048,576 rows in the workbook's excel worksheet. It cannot be inserted using the Insert tab on the ribbon. Images, tables, and shapes can be added by selecting the tab or option for the Insert tab.

Therefore, the correct option is D, Rows.

To learn more about rows, refer to the link:

https://brainly.com/question/29889229

#SPJ2

The question is incomplete. Your most probably complete question is given below:

Pictures

Table

Shapes

Rows

Shana works for a company that makes industrial kitchen equipment that is sold to cafeterias and restaurants. She helps the company’s sales representatives create presentations for clients. They regularly use a custom PowerPoint template to craft their pitches. The sales reps have asked for a slide that will allow them to add a diagram showing the benefits of the equipment they sell.

What steps should Shana take to meet the needs of the company’s sales representatives?

Insert a slide for a diagram each time a sales rep needs to create a new presentation.
In the template’s Slide Master tab, use Master Layout to pick a placeholder for a diagram.
In the template’s Slide Master tab, select Insert Layout, name the layout, and insert a placeholder.
Save a brand-new presentation using the template, select Insert, and choose Charts from the Illustrations command group.

Answers

Answer:

Its C on edg

Explanation:

100%

Answer:

c

Explanation:

Which IEEE standards define Wi-Fi technology?

network standards

802.11 standards

111.82 standards

fidelity standards

Answers

Answer:

802.11 standards

the answer is:

b. 802.11 standards

Write both an iterative and recursive solution for the factorial
problem.

Answers

Answer:

Explanation:

Recursive:

C++ program to find factorial of given number  

#include <iostream>  

using namespace std;  

unsigned int factorial(unsigned int n)  

{  

   if (n == 0)  

       return 1;  

   return n * factorial(n - 1);  

}  

 

// Driver code  

int main()  

{  

   int num = 5;  

   cout << "Factorial of "

        << num << " is " << factorial(num) << endl;  

   return 0;

Iterative:

// C++ program for factorial of a number  

#include <iostream>  

using namespace std;  

 

unsigned int factorial(unsigned int n)  

{  

   int res = 1, i;  

   for (i = 2; i <= n; i++)  

       res *= i;  

   return res;  

}  

 

// Driver code  

int main()  

{  

   int num = 5;  

   cout << "Factorial of "

        << num << " is "

        << factorial(num) << endl;  

   return 0;  

}

What is Naptha used for?

Answers

Answer:

Naphtha is used to dilute heavy crude oil to reduce its viscosity and enable/facilitate transport; undiluted heavy crude cannot normally be transported by pipeline, and may also be difficult to pump onto oil tankers. Other common dilutants include natural-gas condensate, and light crude.

Answer:

Naphtha is used for laundry soaps and clearing fluids

High Hopes^^

Barry-

Please help I upped the points and please don't answer if you don't have the answer..

3. Describe two of your long-term financial goals, and explain why these goals are important to you. List three steps that might help you accomplish this goal. (4-6 sentences. 2.0 points)

4. Describe and example of common financial resource, and example, and a debt. These can be examples from your own life or from other people you know or can imagine. (3-6 sentences. 3.0 points)

Answers

Answer:

3. Paying for my daughter to attend college and building a life outside of struggle. These goals must be accomplished by me finishing school, going onto college and maybe even starting my own business. I must set an appropriate example for my daughter to learn from someone who she believes in. Starting a family business to pass down to generations will be an excellent way to start financially planning now ahead of time.

4. Living in a family of mines, common financial resource is either government assisted or public security.An expense that I cannot escape now is the caring for of my daughter which will vary as she get older. Lastly a debt would be the over spending of credit cards with no money to pay it back as the interest rates climb.

Explanation:

Passivity can harm relationships because those who are passive
a. Have open relationships with others
b. Tend to store up hurt feelings, leading to resentment
C. Typically have excessive self-esteem
d. Are free from self doubt and worry

Answers

Answer:

B. Tend to store up hurt feelings, leading to resentment

Explanation:

May I have brainliest please? :)

Passivity can injure relationships because those who are passive that can tend to store up hurt impressions, leading to resentment.

What is the Passivity?

passiveness or Passivity is defined as Only the feeling of repository visitors that pass before his paintings get down me more than this charlatan, and they may have a hunch that they are being duped, but they are unable to accept the information of their eyes.

Passivity can ruin relationships because passive people prefer to hold on to upset sentiments, which can develop to resentment.

Therefore, option b is correct.

Learn more about the Passivity, refer to:

https://brainly.com/question/20924905

#SPJ2

In this lab you are asked to declare two variables of type integer: userNum and x. The user should input should be stored using scanf statements. Then you are asked to divide the value for userNum by x three times(three different operations). Each time you do the division, assign the value to userNum overwriting the previous value and print it out using a print statement. Do this three times. In this case there is only one new line print statement at the end.
#include
int main(void) {
int x;
int userNum;
scanf("%d %d" , &userNum, &x);
userNum = (double)userNum / x;
printf("%d " , userNum);
userNum = (double)userNum / x;
printf("%d " , userNum);
userNum = (double)userNum / (double)x;
printf("%lf\n" , (double)userNum);
return 0;
}
my input is 100 2
my output is 50 25 12.000
8 months ago

Answers

Answer:

See Explanation

Explanation:

Your program is correct and it follows the correct sequence; however, the reason you keep getting integer result is because the question requires that you declare both variables as integer.

The only modification required in your program is to change change #include to #include <stdio.h> for the program to be free of error.

In Java code, the line that begins with/* and ends with*/ is known as?​​​​​​​​​​​​​​​​​​​

Answers

Answer:

It is known as comment.

Which filter allows you to impart a stamping or raising effect in an image?

A. Stylize filter
B. Noise filter
C. Sharpen filter
D. Blur filter
E. Texture filter

Answers

Answer:

A. Stylize filter

Explanation:

I took the test on edmentum your welcome.

Answer:

Is B because noisse feltrr✔️

Which tool did Adnan use to modify the image?

rotation handle
left sizing handle
top sizing handle
corner sizing handle

Answers

Answer:

D

Explanation:

Answer:

corner sizing handle

Explanation:

The CPU is located on what part of the computer?

the motherboard

the system bus

the random access memory

the hard drive

Answers

Answer:

the motherboard

Explanation:

The answer for this question is the first one.

______ means locating a file among a set of file​

Answers

Answer:

computer files

Explanation:

What is the appropriate guidelines to create and manage files

Answers

Answer:

1. Do not copyright

2. Nothing illegal

3.Do not put personal info

Explanation:

Submit your design an informative computer safety brochure for a specific cybercrime that targets an audience of your choice.

Answers

USE SOCRACTIC IT WOULD DEFINITELY HELP ANSWER THIS QUESTION Try it

What is a backdoor?
A. A different sign-in page to log into a computer
B. An unrecognized entry into a computer or system
C. A fake version of software to access a computer system
D. An administrative login feature of computer software

Answers

B. Generally backdoors are logins/access to something without permission and without admins knowing.

Steven wrote an algorithm for his coding class that explains how he makes a cake. Which is the correct sequence of steps that he used?

Mix the ingredients, put into the oven, preheat the oven
Preheat the oven, mix the ingredients, put into oven
Preheat the oven, put into the oven, mix the ingredients
Put into the oven, mix the ingredients, preheat the oven


WILL GIVE ALOT OF POINTS "29" TOTAL

Answers

Answer:

Preheat the oven, mix the ingredients, put into oven.

Answer:

Preheat oven, mix the ingredients, put into oven

Explanation:

basically its B

:)

Other Questions
The regular price of a baseball hat is $16.85. If Emesto buys the baseball hat on sale for 20% off the regular price, how much change will bereceive after paying with $20? I need help with 15. Explain what the quipu was and how it was used. What was its drawback? Brad jarred 12 litersof jam after 2 days.How much jam didBrad jar if he spent 3days making jam? The process that creates offspring that are different within a population is ______.A. Asexual reproduction B. Sexual reproduction C. Cell division D. Binary fission Where did the Homestead Act encourage freed African Americans to settle?A. Plantations in the SouthB. Reservations in the Tennessee River ValleyC. Big cities in the NorthD. Farms on the Great Plains Your friend lives in Tokyo, Japan. She wants you to call her on Wednesday at 8am, Tokyo time. You live in Chicago. What day and time will it be in Chicago when you call your friend? If a steel nail is wrapped 8 times with an insulated copper wire and each end of is attached to a 1.5 V battery, we find that it will lift the weight of 2 large paper clips. We hypothesized that for each 8 coils, you will be able to pick up one additional paper clip. When we ran the experiment, we observed and recorded that when we added 8 more wraps around the nail (16 coils) we could lift 4 paper clips and when we added 8 more wraps (24 coils) we could lift 6 paper clips. Choose the correct conclusion to the experiment.1. We redesign the test and hope for better results.2. We concluded that every time we add 8 wraps to the nail the total number of paper clips lifted doubled.3. We concluded that our original test flawed. Because of the results, 8 coils should be able to pick up 2 paper clips. We will check our original test with a fresh battery.4. We concluded that something went wrong with the experiment since it didn't give us the results we expected. Is the United state ready for a woman president?. Hewp me pwease :( *insert puppy dog eyes* 11 + (7)^29 Mountain bike is priced at 413 if he sells tax is 6.5% what is a constant purchase a mountain bike round to the nearest cent if necessary Which of the following have a value equal to |37|? Select all that apply.A. -37B. 1-371C. 0D. -(-37)E. 37 2) Qu pas con los colonos que vivan al oeste de los Apalaches? What happened to the colonists who lived west of the Appalachians? The melting point of chromium is 1890. The melting point of argon is -189. Suggest a reason for this difference. How have batteries gotten better over time According to the sequence of events described in The Riddle of the Rosetta Stone, what leads the scholars to believe that the three inscriptions say the same thing in different languages?the discovery of the Rosetta Stone by soldiersthe letter sent by the army officer to the scholarsthe appearance of the ancient Egyptian hieroglyphsthe translation of the last sentence of the Greek text Question 1 of 10Pictures at an Exhibition was composed by:A. Mussorgsky.B. BorodicaC. Rimsky-Korsakov.O D. Tchaikovsky.SUBMIT 7.2 7.21 7.083 least to greatest This engraving shows people removing artwork, sculpture, and other decorations from a church.This practice is called .The church shown was most likely built by .The artwork is being removed because the people thought it was . Unit 1 TestQuestion 4Which civilization developed first?Your answer:EgyptMesopotamiaChinaO IndusClear answerBackNextO Type here to search