What is better in everybodys opinion. AMD or Intel?

Answers

Answer 1

Answer:

Intel is more for work and such, while AMD is foucsed on gamers. I use AMD because I play many games, but it really depends on what you use your computer for.

Explanation:

Answer 2

it depends Explanation:AMD wins the CPU war overall right now, but depending on your needs, an Intel processor could still be the better choice. If you want the best in overclocking, gaming or software support, or if you want productivity performance without buying a discrete GPU, Team Blue has the advantage. But if you want the best balance of price and performance in the Intel vs AMD lineup, Team Red deserves your money.


Related Questions

What is "fake news"? Why do officials want students to learn to recognize it? How do officials plan to help students do this?

Answers

Fakes news is any type of news that is false or incorrect. Officials are trying to teach students about fake news because fake news is everywhere. It is influencing what students do. When they see something on social media they might share it, and it will spread. It even may show them something violent or inappropriate. Officials are doing multiple things to help students, such as seminars in school, assemblies in school, etc.

Which of the following quantities has decreased with the advent of digital technology? attendance at live performances quality of music production cost of performance advertising longevity of established artists

Answers

Answer:

A. The correct answer is attendance at live performances.

Explanation:

took it on edge 2020

When you execute this block in Scratch, your computer is actually doing several things: retrieving values from memory representing the direction and position of the sprite, performing an algorithm to update these values, and changing the display in the window to match the updated state of the program. All of these actions are represented by just one single block.

Which of the following terms names the phenomenon which is best described by this statement?

a) Iteration
b) Sequencing
c) Compilation
d) Abstraction

Answers

Sequencing is the term that names the phenomenon which is best described by the given statement.

Sequencing refers to the order of logical arrangement whereby an instruction is executed in the proper order. This means that one process must be completed before the next command becomes valid and executes.

From the given statement, the computer is performing various operations in sequence which are:

Retrieving values from memoryPerforming algorithmChanging the display

These functions are done by order, using a single block.

Read more here:

https://brainly.com/question/18744767

when implementing group aba programs, it is important to monitor both processes and .

Answers

When implementing group aba programs, it is important to monitor both processes and outcomes .

What procedure might you use in applied behavior analysis?

The techniques used in applied behavior analysis center on identifying specific behaviors, defining those behaviors, designing interventions to change those behaviors, putting those interventions into practice, evaluating those interventions' efficacy, and either continuing the interventions or creating procedures to maintain them.

If a program achieved its objectives, you can tell from an outcome evaluation. An analysis of the process explains how and why. The services, activities, policies, and procedures of a program are described in a process evaluation.

Therefore, one can say that it is determined whether program activities have been carried out as anticipated through process/implementation evaluation. An evaluation of the program's outcomes or outcome objectives examines the program's effects on the intended population by tracking its progress.

Learn more about processes and outcomes from

https://brainly.com/question/14704067
#SPJ1

________ is a computer application that enables a firm to combine computerized functions of all divisions and subsidiaries of the firm into a single, integrated software program that uses a single database.

Answers

Answer:

Yash Sharma Hemant Kumar

you are the manager of the eastsim domain. your active directory structure has organizational units (ous) for each company department. assistant administrators help you manage active directory objects. for each ou, you grant one of your assistants full control over the ou. you come to work one morning to find that while managing some user accounts the administrator in charge of the sales ou has deleted the entire ou. you restore the ou and all of its objects from a recent backup. you want to make sure that your assistants can't delete the ous they are in charge of. what should you do? (select two. each choice is a possible solution.) answer remove full control permissions from each ou. run the delegation of control wizard for each ou, granting permissions to perform the necessary management tasks. edit the properties for each ou. for the ou administrators, deny the delete all child objects permission. edit the properties for each ou. for the ou administrators, grant full control permissions but apply the permissions to this object only. edit the properties for each ou. for the ou administrators, allow all permissions, but deny full control permissions. edit the properties for each ou to prevent accidental deletion.

Answers

To prevent similar incidents from happening in the future, you should implement two possible solutions. The first solution is to remove full control permissions from each ou. By doing so, the assistant administrators will only have the necessary permissions to perform their management tasks, and they won't be able to delete the entire ou.

1) The second solution is to run the delegation of control wizard for each ou, granting permissions to perform the necessary management tasks. This will allow you to specify exactly what tasks each assistant administrator can perform, and they won't have the ability to delete the entire ou.

2)In addition to these solutions, you could also edit the properties for each ou. For the ou administrators, deny the delete all child objects permission. This will prevent them from accidentally or intentionally deleting the entire ou. You could also edit the properties for each ou. For the ou administrators, grant full control permissions but apply the permissions to this object only. This will allow them to have full control over their respective ous, but they won't be able to affect other ous.

3)Finally, you could edit the properties for each ou to prevent accidental deletion. This will require a confirmation prompt before deleting any objects in the ou, which will prevent any accidental deletions. By implementing these solutions, you can ensure that your assistants won't be able to delete the ous they are in charge of, and you can prevent any similar incidents from happening in the future.

For such more question on delegation

https://brainly.com/question/29725282

#SPJ11

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

an attacker was able to gain unauthorized access to a mobile phone and install a trojan horse so that he or she could bypass security controls and reconnect later. which type of attack is this an example of?

Answers

This is an example of a Trojan Horse attack.

What is unauthorised access?

Unauthorised access is when someone accesses any type of data or information without permission. This could be physical access such as entering a secure building, or electronic access such as logging into a computer system or network. Unauthorised access could lead to a data breach or other security issue, which could have serious consequences. It is important to ensure that all access to sensitive data is secure and authorised by the appropriate personnel.

A Trojan Horse is a type of malicious software that appears to be legitimate but is actually designed to perform malicious activities, such as stealing data or allowing an attacker to gain unauthorized access. Unlike other attack methods, a Trojan Horse does not exploit any security vulnerabilities, but rather relies on the user to open the malicious file or program. Once the malicious code has been installed on the device, the attacker can then use it to bypass security controls and gain remote access. For this reason, it is important to ensure that all devices, especially those containing sensitive data, are properly protected against such attacks.

To know more about unauthorised access click-

https://brainly.com/question/28809596

#SPJ4

Every module has all of the following except _____? a. A header b. Local variables c. A body d. A return statement. local variables.

Answers

Every module has all of the following except _ local variables____ The correct option is B

What is module ?

A self-contained piece of code that completes a particular purpose is known as a module. Each module has a return statement, a body, and a header. The header includes the module name as well as any global variable declarations that the module may utilize.

The code that completes the module's task is found in the body. The return statement gives the calling module back control. Local variables are declared inside a module's body and cannot be accessed from outside the module. Therefore, not every module contains local variables.

Learn more about module here : brainly.com/question/18084961

#SPJ1

PLEASE HELP ASAP PLEASE AND THANK YOU
In a computer numerical control (CNC) machine, if the tool has to move downward and then rotate counter-clockwise around the vertical axis, along which of the following axes would it move?
A. x-axis, B axis
B. z-axis, C axis
C. z-axis, A axis
D. y-axis, A axis

Answers

In a computer numerical control (CNC) machine, if the tool has to move downward and then rotate counter-clockwise around the vertical axis, it would move along the z-axis and rotate around the A axis. The correct option is C.

The z-axis typically represents the vertical axis in a CNC machine, controlling the up and down movement of the tool. Moving downward would involve traversing along the z-axis.

The A axis, on the other hand, is often used to denote rotational movement around the vertical axis.

The counter-clockwise rotation mentioned in the question would correspond to movement along the A axis.

Therefore, the correct answer is: C. z-axis, A axis

For more details regarding CNC machine, visit:

https://brainly.com/question/15593597

#SPJ1

Which code is easier to learn, Python or C++. And which one is better than the other in your opinion

Answers

Okay so I’m terms of easiest to learn it depends on the person for me it is Python and python is better because it can be used for lots of purposes

from the following list, select the additional benefits of integrating erp systems with financial management systems to provide centralized access and management of financial data.

Answers

The benefits of integrating ERP systems with financial management systems are:

a. improved visibility.

c. the ability to generate financial reports.

d. greater interaction between demand and supply.

What is integrating ERP systems?

The process of integrating your ERP system with other business software is known as ERP integration.

Your systems can share data and information that are essential to various business activities thanks to the integration. It is a means to automate routine tasks and boost productivity within a company.

Therefore, the correct options are:

a. improved visibility.

c. the ability to generate financial reports.

d. greater interaction between demand and supply.

To learn more about integrating ERP systems, refer to the link:

https://brainly.com/question/14403939

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Check All That Apply

improved visibility

structured compliance architecture

the ability to generate financial reports

greater interaction between demand and supply

Which security feature in windows 10 prevents malware by limiting user privilege levels?.

Answers

"User Account UAC" is a security thing in Windows 10 that prevents malware besides limiting user privilege levels.

What is defined as the term user privilege levels?

Privilege levels allow you to specify which commands consumers can issue after logging into a network device."

Cisco Internetwork Operating System (IOS) has 16 privilege levels ranging from 0 to 15. Users with lower privilege levels have access to fewer commands than those with higher privilege levels.User Account Control (UAC) is a generic term term for a group of technologies that make it easier to use Windows with fewer privileges, such as registry as well as file virtualization, honesty levels, and elevation prompts. Protected Administrator (PA) accounts were created with consumers in mind, enabling Windows to be utilized with standard user privileges most of the time, and yet privileges can be elevated to filled administrator rights without the need for a separate user account's credentials. If the served its purpose the elevation request, UAC adds the necessary rights to the user's security token.

Thus, "User Account UAC" is a security thing in Windows 10 that prevents malware besides limiting user privilege levels.

To know more about the user malware, here

https://brainly.com/question/399317

#SPJ4

Which of the following demonstrates an information system? Tyra is using the computer to create a birthday card for her friend. Ahmad is installing new software to improve the ease of accessing the database. Shania is creating a printed handbook of company policies for new employees. Ian is making updates to the company website to include the latest product information

Answers

Answer:

B. Ahmad is installing new software to improve the ease of accessing the database.

C. Shania is creating a printed handbook of company policies for new employees.

D. Ian is making updates to the company website to include the latest product information

Explanation:

Information Systems is an organized way of assembling, processing, storing, and sharing information. It is used by organizations to run their businesses. A typical information system will feature the people who run or control the process, the tasks they are meant to perform, the procedures which govern the work done, and the technology used to achieve those goals. Information systems incorporate information technology into the running of the business. The examples cited above, illustrate the application of information systems in business affairs. For example,

1. When Ahmad installs new software to improve the ease of accessing the database, the main components of an information system which includes; people (Ahmad), the task (which entails installation of the software), the procedures (that govern software installation), and the technology (apparently a computer system), all have a role to play.

HELP

Through photographs, we can represent concepts and ideas. From the following list of concepts, choose 10.


You should display the concept or idea in some way within your photograph. For example, if one concept was "Blue," you might photograph the color blue in the sky, a blue item of clothing, a person with a sad expression (which is sometimes described as "having the blues"), and so on. Be creative!


Happy

Pink

Chair

Music

Cold

Looking out

Vegetable

School

Smile

Love

Shadow

Up

Newness

Water

Red

Season

Door/Gate

Hand

Drink

Words

Treasure

Oldness

Natural

Beauty

Little

Part Two


Select your five favorite photographs to create a presentation on a computer. For each photograph, identify the concept that you are presenting and how you have shown this concept in the photograph.

Answers

Answer:

You need to pick 10 concepts from the list and take/pick a picture you think shows the concept. You then pick 5 of your favorites from the 10 and put them on a slideshow, explaining what concept it is and how it shows it.

Explanation:

So if I did vegetable, I would take a good picture of a carrot. Then, if I picked it as one of my five favorites, I would put it on a presentation and say, "This displays the concept of vegetables. My picture shows this concept because carrots are a type of vegetable."

what is the importance of familiarizing and understanding the cells rows and format tools in the microsoft cell​

Answers

Answer:

so you know the cell rows

Explanation:

duh

What is a layer, in the context of this lesson?

the ethernet word for a packet

a device for remembering something

a logical unit of a system

a computer’s most basic program

Answers

Answer:

A logical unit of a system.

Explanation:

i'm thinking your are talking about system layers such as the ISO? Layers help identify the order of how the whole system works.

A logical unit of a system is a layer, was the based on the lesson in the main motive. Thus, option (c) is correct.

What is layer?

The layer refers to the layering method of breaking up the delivery of messages into discrete components and activities. Communication programs are frequently multi-tiered. Layers are useful because they allow you to add components to an image and work on them one at a time without permanently affecting the original image.

A logical unit is a device or software program that allows an end user (an application program, a terminal user, or an input/output mechanism) to connect to a network. A logical unit number is a one-of-a-kind identifier for a single or group of physical or virtual storage devices that execute.

As a result, the logical unit of a system is a layer, was the based on the lesson in the main motive. Therefore, option (c) is correct.

Learn more about on layer, here:

https://brainly.com/question/13490759

#SPJ5

Select the correct text in the passage.
Which sentences highlight the correct way of preparing baked potato?
George finds that there are no vegetables at home today except potatoes. He decides to prepare something simple with the potatoes. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour. Joe is at home with his friend Elvis. He shows Elvis how to prepare baked potatoes. He preheats oven at 150°F. He then puts potatoes in water. After cleaning the potatoes, he bakes the potatoes in oven at 150°F for 30 minutes.

Answers

Answer:

. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour.

Explanation:this is correct because got it right on the test.

1.6 code practice: question 1 edhesive

Answers

Answer: g = input("Enter a word: ")

m= input("Enter a word: ")

print(g +" " +m)

Explanation:

Need answer ASAP

In which phrase does software coding and testing happen in the spiral model?

The spiral model does not have a separate testing phase. Both software coding and testing occurs during the _____ phase.

Answers

both software coding and testing occurs during Engineering phase

how to style rule for header footer aside

Answers

You may use CSS to style the HTML header, footer, and sidebar elements. As an illustration of how to style certain elements, consider the following CSS copy code: header background-color: #333; colour: #fff;

Padding: 20px; /* Style the header element /* The footer's background colour is #333, its colour is #fff, its padding is 10 pixels, and its text alignment is centre. The aside element should be styled. Background colour is #f5f5f5, padding is 10 px, float is to the right, and width is 30%. The header and footer components in this example have distinct padding values but the identical background and text colours. The text-align attribute is also used to centre the footer. The aside element is floating to the right and has a width of 30% of its container. It also has a separate background colour.

learn more about header footer here:

https://brainly.com/question/30436948

#SPJ4

Your local changes to the following files would be overwritten by merge.

Answers

If you haven't done so, you can stash your changes temporarily, pull the remote changes, and then apply your changes back to the merged code.

What can you do to avoid losing your local changes when merging changes made by someone else in a repository?

When multiple people work on the same files in a project, conflicts can occur when merging changes. Git, a popular version control system, will alert you if your local changes conflict with changes made by someone else in the repository.

To avoid losing your local changes, you should first commit and push them to the repository before pulling changes from the remote branch. If you haven't done so, you can stash your changes temporarily, pull the remote changes, and then apply your changes back to the merged code.

Learn more about merged code.

brainly.com/question/14192987

#SPJ11

solve each ratio 35:7​

Answers

Answer:

5:1

Explanation:

Divide each side by 7

execute chmod 400 subdir ; ls subdirand describe what happens, and why.here i want some detail as to why i get the messages that i get

Answers

This command will change the permissions of the subdir directory to 400.

What is subdir directory?

A subdirectory, also known as a subfolder, is a directory that is located inside of another directory. Subdirectories are used to organize and store related groups of files and folders. For example, if you have a website, you could create a subdirectory for each page of your website, such as a “Home” folder and an “About” folder. Subdirectories can also be used to organize documents within a larger folder, such as a “Documents” folder that contains subfolders for different topics or projects.

This will make the directory only accessible by the owner. It means that only the owner can read, write, and execute the contents of the directory. When you use the ls subdir command, you will get an error message that you don't have the permission to access the directory because you don't have the required permissions (400). This is why you get the error message.

To learn more about subdir directory
https://brainly.com/question/18917489
#SPJ4

What is the very first step that should be taken when performing work with a computer?

Answers

Answer:

You should power down the system and unplug it.

In which of the following phases of filmmaking would a production team be focused on the
process of casting? (Select all that apply).
development
pre-production
distribution
post-production

In which of the following phases of filmmaking would a production team be focused on theprocess of casting?

Answers

I think it’s pre production! Goodluck :)

Answer:

Pre-Production

Explanation:

Once the film concept has been developed, the film company transitions to the production phases: pre-production, production, and post-production. In pre-production, the technical details are worked out, a schedule is set, and the resources to produce the film are assembled. This includes casting the film, filling the technical positions, and scheduling the production. The actual filming takes place during the production phase, followed by a post-production phase in which the footage is edited and the final film emerges.

Which of the following are advantages of using meaningful names for variables when writing a program? Select two answers.
1. Less variables will be required as the existing ones can be renamed throughout the program.
2. It is easier for a person reading the code to identify the purpose of a variable and follow the logic of the program.
3. It is simpler for the compiler to compile the program, meaning wait times and errors are reduced.
4. The programmer is less likely to make a mistake and use a variable for the wrong purpose.

Answers

Answer:

The answer is 2 and 4, please give brainliest award.

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ​

Answers

Answer:

ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ​

Explanation:

Answer:

Plzzzzzzzzzzzzzzzz tell me what is your question I will try to solve it

we cannot share software in computer network true or false​

Answers

Answer:

false

Explanation:

false but other thing is that it can be very risky increasing the chances of getting infected by a virus

Other Questions
Helpppp plzzz!!!!!!!! 15+PTS and Brainliest !!!!!!!!!What does it mean to be American? Directions: You must show enough of your work so that the grader can follow what you did. If it is possible to find an exact answer by taking an algebraic approach, you may not received full credit for an approximation or a calculator-generated answer. Your calculator is the only tool available to you during a test: no notes, homework, phones, no collaboration with others, etc. Time: 10 minutes Exercise 1. (50 points) Find: a) y where y=x+eb) f(x) where f(x)=5e what would happen if there were suddenly no computers,tables or phones of any kind anywhere on earth Which are usually shallow and filled with an abundance of plant and animal life? Ponds, oceans, rivers, and lakes Hown below are the top 15 market research firms in the United States in 2014 according to the AMA Gold Top 50 Report. Compute the mean, median, P50, P40, P85, Q1, Q3, range, and the interquartile range on these data. Company Sales ($ millions) Nielson Holdings N.V. $3,194.3 Kantar 952.6 IMS Health Inc. 935.0Ipsos 574.1 Westat Inc. 563.7 Information Resources, Inc. 504.0 GfK USA 334.5 comScore Inc. 202.7 The NPD Group Inc. 202.3 Symphony Health Solutions 196.5 J.D. Power and Associates 172.9 ICF International Inc. 172.0 Abt SRBI Inc. 155.7 Maritz Research 138.9 dunnhumbyUSA LLC 121.5 a 32kg object has a momentum of 480kg m/s northward. what is the objects velocity ? 9. An unusually warm summer causes the population of mice in a prairie todecrease. This is an example of a(n)factor affectinga(n)factor. * when was the first president born? Find the value of X and Y Find the absolute maximum and the absolute minimum for thefunctionf(x)=e^3xe^5x, 0.845x1.255Absolute minimum:x=y=Absolute maximum:x=y= the structure found between the epiphysis and diaphysis in a child and is a site of bone growth is the s they develop complex understandings of themselves and the wider world, people regularly devise symbols to organize this knowledge. a. true b. false Which element has four electrons that are available to form strong bonds,making it crucial for building largebiomolecules?A. SulfurB. OxygenC. HydrogenD. CarbonSUBMIT Which of the following commands can be used to scan a filesystem for disk usage, create, check, and repair quota files? a. chkquota b. quotacheck c. edquota d. quota On December 31, a company sold equipment for $55,000. The equipment had an initial cost of $635,000 and has accumulated depreciation of $510,000 Depreciation has already been taken up to the end of the year. What is the amount of the gain or loss on this transaction? loss of $30,000 gain of $25,000 gain of $55,000 gain of $30,000 Describe solar energy: Identify the slope intercept equation of a line that has aslope of - } & y-intercept of (0,3).y = - X-O y = -3x +23Oy= x-3Oy = x+3 If mBC = mBD =140 degrees then What is m Asif wants to buy a Smart Phone for 360. He has already saved 105.Each week he is paid 90. He saves 25% of his pay.How many more weeks must he save for to afford the phone? Question 16 (1 point) An object is thrown from the top of a building. The following data measure the height of the object from the ground for a five second period. Calculate the correlation coefficient using technology (you can copy and paste the data into Excel). Round answer to 4 decimal places. Make sure you put the 0 in front of the decimal. Seconds Height 0.5 112.5 1 110.875 1.5 106.8 2 100.275 2.5 91.3 3 79.875 3.5 70.083 4 59.83 4.5 30.65 5 0 Answer:___ Question 16 options: