The choice between storing the operating system in firmware or on disk depends on the specific needs and requirements of the system, such as performance, reliability, and flexibility.
Explanation:
Some systems store the operating system in firmware, while others store it on disk due to the differences in their design, intended use, and performance requirements.
In systems that store the operating system in firmware:
1. The system requires a quick boot-up time as the firmware allows for faster access to the operating system.
2. These systems are often designed for specific purposes or applications, so they require a smaller and more specialized operating system.
3. Storing the operating system in firmware provides greater reliability and protection against data corruption or loss.
On the other hand, storing the operating system on disk allows for greater flexibility in terms of customization and updates. It also allows for the use of larger operating systems that may not fit in firmware.
Learn more about reliability here:
https://brainly.com/question/31286082
#SPJ11
what will disc paging in virtual memory do if the memory in ram is full?
Answer:
If your RAM is full, your computer is slow, and its hard drive light is constantly blinking, your computer is swapping to disk. ... If this is occurring, it's a clear side that your computer needs more RAM – or that you need to use less memory-hungry programs.
methods that retrieve data of fields are called and methods used to modify the data in fields are called
Field data retrieval methods are referred to as Accessors, and field data modification methods are referred to as Mutators.
A mutators method is a technique used in computer science to manage changes to a variable. As setter techniques, they are likewise well-known. A getter, which returns the value of the private member variable, frequently follows a setter and together they are referred to as accessors.
According to the encapsulation concept, the mutator method is most frequently employed in object-oriented programming. In accordance with this principle, member variables of a class are made private to hide and protect them from other code. A public member function (the mutator method) is the only way to change a private member variable; it receives the desired new value as a parameter, validates it, and then modifies the private member variable. Assignment operator overloading and mutator methods are similar.
Learn more about mutators here:
https://brainly.com/question/15725263
#SPJ4
Which piece of network hardware keeps a record of the MAC address of all devices connected to it and uses this information to direct data packets to the appropriate port? A) server B) bus C) router D) switch
A switch is a piece of network hardware keeps a record of the MAC address of all devices connected to it and uses this information to direct data packets to the appropriate port. The correct option is D.
What is switch?Using packet switching to receive and forward data to the intended device, a network switch is networking hardware that joins devices on a computer network.
A network switch is a multiport network bridge that transmits data at the OSI model's data link layer using MAC addresses.
By removing the MAC address data from the headers of transmitted Ethernet data packets, switches are able to identify the MAC addresses of the networking devices that are connected to them.
A switch associates the data packet's port with the retrieved MAC address.
Thus, the correct option is D.
For more details regarding network switch, visit:
https://brainly.com/question/14748148
#SPJ1
An electric spreadsheet can perform all of the following tasks, except
A. Display information visually
B. Calculate data accurately
C. Plan worksheet objectives
D. Recalculate updated information
Answer:
C. Plan worksheet objectives
Explanation:
Complete the procedure for forwarding a message by selecting the correct term from each drop-down menu.
1. ___ or open a message.
2. Click the Forward button.
3. In the To field, enter the names of intended recipients.
4. Click the ___ button.
Answer:
Preview; send.
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).
An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.
The procedure for forwarding a message to a recipient include;
1. Preview or open a message. This is to ensure that the appropriate or specific message is selected.
2. Click the Forward button. This button opens the dialog box to allow the sender input various details about the message and the recipient.
3. In the To field, enter the names of intended recipients.
4. Click the send button. This button automatically forwards the message to the intended recipient(s).
Which of the statements below is true about the Windows OS?
-The Start menu is located in the top right comer.
-You can access Help files from the Start menu.
-The Web browser icon is usually found in the Quick Launch area.
-The Show Desktop icon will minimize all open windows
O Clicking on the X in the upper right corner of a window will close the window
Answer:
1. false
2. true
3. true
4. false
5. true
Explanation:
A user can access help files from the Start menu, the Web browser icon is typically located in the Quick Launch area, and clicking the X in the upper-right corner of a window will close it are all true statements about the Windows operating system.
What is the Windows OS?Microsoft Windows is a personal computer operating system (OS) created by the Microsoft Corporation. It is also known as Windows and Windows OS (PCs).
Microsoft created and distributes a number of proprietary graphical operating system families under the name Windows. With Windows NT for consumers, Windows Server for servers, and Windows IoT for embedded systems, each family targets a certain area of the computer industry.
Therefore, the statements A and D are false.
Learn more about the windows, refer to:
https://brainly.com/question/13502522
#SPJ2
The purpose of the merge and center command is to _____.
Assignment: Earth’s Surface Exploration
Answer:
Stop waiting until the due date
Explanation:
Why you always wait until the last minute to turn in yo assignments
1. You are an HR manager for a company that handles sensitive business and customer information. Your company is considering the adoption of cloud computing model to reduce infrastructure costs. Which type of cloud computing environment is most suitable for your organization that will provide you with significant flexibility, scalability, and cost-efficiency of vendor's infrastructure, yet maintain complete control over your sensitive data and applications?
a.public cloud
b.hybrid cloud
c.multiple cloud
2. You are an HR director at a Fortune 500 Company. The current IT- business initiative is replacing your legacy employee performance and development management system with an SAP module. You are following an agile approach to this new IS development. Which of the following is the most attractive aspect of such agile system development from the business perspective?
Stakeholders will ultimately make the decision regarding whether to implement the system.
Early engagement of stakeholders will ensure the success of the implementation.
Early engagement of stakeholders reduce or eliminates the need for training later in the process
3. The goal of unsupervised learning is for the machine to
"memorize" or store, correct answers it discovers as it processes example scenarios
Weight network connections so as to identify choices with the most feedback
Train itself to learn form the input and be in a mode of continuous improvement.
1. The type of cloud computing environment that will provide your organization with significant flexibility, scalability, and cost-efficiency of vendor's infrastructure, yet maintain complete control over your sensitive data and applications is hybrid cloud. The answer is option (b).
2. From a business perspective, the most attractive aspect of agile system development is that early engagement of stakeholders will ensure the success of the implementation. The answer is option (2).
3. The goal of unsupervised learning is for the machine to train itself to learn from the input and be in a mode of continuous improvement. The answer is option (3)
1. Hybrid cloud computing provides flexibility by allowing the company to control critical applications, provides cost-effectiveness by keeping sensitive data on a private cloud that can be managed internally, offers scalability by allowing the company to use public cloud services to meet fluctuating demand while maintaining control over private cloud resources and it ensures data security by keeping sensitive data on the private cloud.
2. Agile system enables companies to respond rapidly to changing business needs while still delivering high-quality products that meet user expectations. By involving stakeholders early on, you can gather their insights, requirements, and feedback, which helps in shaping the system to meet their needs effectively.
3. Unsupervised learning is a type of machine learning in which the machine is given a set of input data and tasked with finding patterns or relationships within that data. The ultimate goal is to improve the machine's ability to process and understand new data, leading to more accurate and valuable insights.
Learn more about cloud computing environment:
brainly.com/question/17401518
#SPJ11
Is there an equivalent notion of header information that is added to passengers and baggage as they move down the airline protocol stack?
With reference to airline industry, they use tags that holds information on passenger's name, destination and flight number for identification.
What is the equivalent notion of header information that is added to passengers and baggage as they move down the airline protocol stackIn the context of the airline industry, there is a similar concept to header information called baggage tags, which are attached to each checked bag as it moves through the airline's handling process. These tags contain information such as the passenger's name, flight number, destination, and a unique identifying number for the bag. This information is used to track the bag's location and ensure that it is loaded onto the correct flight and delivered to the correct destination. Similarly, passengers are assigned boarding passes, which contain information such as the passenger's name, flight number, seat assignment, and departure gate. This information is used to manage passenger flow through the airport and onto the correct flight. So, while the exact terminology may differ, the concept of adding identifying information to passengers and baggage as they move through the airline protocol stack is an essential aspect of airline operations.
Learn more on airline industry here;
https://brainly.com/question/28147456
#SPJ1
Discuss the advantages and disadvantages of telecommuting and
having a virtual office.
Telecommuting and having a virtual office are becoming increasingly popular in the modern workplace. Telecommuting refers to working from home or a remote location, while a virtual office refers to a virtual workspace where employees can access necessary tools and resources online.
Both options have advantages and disadvantages, as discussed below.
Advantages of TelecommutingFlexibility:
Telecommuting allows employees to work from anywhere, giving them greater flexibility to balance work and personal responsibilities. Cost Savings: Employees who telecommute save money on transportation costs and other expenses associated with working in a traditional office.
Improved Productivity:
Telecommuting allows employees to work in a comfortable environment free from office distractions, leading to increased productivity.
Disadvantages of TelecommutingSocial Isolation:
Working from home can lead to social isolation, as employees may miss out on the social interactions that come with working in an office.
Limited Communication:
Telecommuting may result in limited communication with colleagues and managers, which can lead to misunderstandings and missed opportunities.
Technology Issues:
Telecommuting requires reliable technology and a strong internet connection, which can be problematic in areas with poor connectivity.
Advantages of a Virtual OfficeCost Savings:
A virtual office eliminates the need for a physical office, saving money on rent, utilities, and other expenses.
Flexibility: A virtual office allows employees to work from anywhere, giving them greater flexibility to balance work and personal responsibilities.
Improved Productivity: A virtual office eliminates the distractions associated with a traditional office, leading to increased productivity.Disadvantages of a Virtual Office.
Social Isolation: A virtual office can lead to social isolation, as employees may miss out on the social interactions that come with working in an office.
Limited Communication: A virtual office may result in limited communication with colleagues and managers, which can lead to misunderstandings and missed opportunities.
Technology Issues: A virtual office requires reliable technology and a strong internet connection, which can be problematic in areas with poor connectivity.
Overall, both telecommuting and having a virtual office have advantages and disadvantages. While they offer greater flexibility and cost savings, they may lead to social isolation and limited communication. Employers must consider these factors when deciding whether to implement telecommuting or a virtual office in their workplace.
To learn about telecommuting here:
https://brainly.com/question/29645344
#SPJ11
______ refers to factors that distort message clarity.
a. noise
b. information overload
c. encoding reputation
d. management decoding
The term that refers to factors that distort message clarity is "noise." Noise can be defined as any interference or disturbance that affects the communication process and hinders the accurate transmission of the message. the Correct answer is a
It can take various forms, such as physical noise (e.g., loud sounds), psychological noise (e.g., distractions or biases), semantic noise (e.g., misunderstandings due to language barriers or jargon), or even technological noise (e.g., poor signal or transmission quality).
Noise can disrupt the encoding, transmission, or decoding of the message, making it difficult for the intended meaning to be effectively conveyed.
By understanding the different types of noise, individuals can take steps to minimize its impact and improve message clarity.
In conclusion, noise is the term that refers to factors that distort message clarity. It is important to identify and address noise in communication to ensure effective and accurate information exchange.
To know more about factors visit;
brainly.com/question/31931315
#SPJ11
Isabela wants to edit a presentation for her science class. she is in the main view of the powerpoint application. how can she access her presentation? go to the backstage view, and click options. click the file tab, and click the open option. click the quick access toolbar, and click the open option. type in the name of the file in the search field, and click open.
The Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.
What is power point presentation?Power point presentation is a softwere which display the data with the help of collection of slides.
Isabela wants to edit a presentation for her science class. She is in the main view of the powerpoint application.
Form the main view to access her presentation, Isabela need to follow the following steps-
Click the file tab which is at the main menu.Now she need to click the open option, which appers under the file tab.Thus, the Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.
Learn more about the power point presentation here;
https://brainly.com/question/24653274
Answer: It’s B, Click the File tab, and click the open option
Explanation:
just got it right on edge
Which of the following groups on the Home tab contains the commands to insert delete and format cell width and height? Question 1 options: Styles Cells Editing Number.
The cells feature is used to format the cells. The features in this section are insert, delete, and format cells. Cell size can be edited using this section.
What are the features available on the home screen of excel?Excel is a tool that is used to create sheets or tables to show data. It is capable of performing some complex tasks also. The home screen of excel contains many features.
Some of the features are:
Font: It is used to format the style and size of the characters. It also includes bold, italic, etc formattings.Alignment: This feature is used to align the text in the cells. The option included in this are merge cells, wrap text, center/left align, etc.Style: It is used to format or design the table or group of cells. it includes features like conditional formatting, format as a table, cell style.Cells: Cells feature is used to format the cells. The features in this section are insert, delete, and format cells. Cell size can be edited using this section.Editing: It is used to edit or use filter in the cell or cells.Number: This section defined the type of content present in the cell and its significant figures. The common types are currency, number, date, time, etc.Therefore, The cells option has the commands insert, delete, and format options.
Learn more about excel here:
https://brainly.com/question/25879801
what is the extension of a Microsoft access database 2013
Answer:
Access Database (2007, 2010, 2013, 2016)..accdb
Answer:
.accdb
Explanation:
.accdb is the extension of Microsoft Access Database 2013
What is row and column? class 9
Answer:
just click the picture
Explanation:
plz mark me a BRAINLEST plss I just need it
when you add information to a word-processing document, one of the roles that your operating system plays is that is saves your unsaved work to temporary storage. t/f
True. When you add information to a word-processing document, the operating system saves your unsaved work to temporary storage. This temporary storage is also known as the computer's RAM (Random Access Memory).
This allows the information you are inputting to be saved, even if you do not click the 'save' button.The operating system decides the file's name, location, and size. When you add information to a word processing document, one of the tasks your operating system completes is storing your unsaved work to temporary storage.
More On RAM: https://brainly.com/question/30332356
#SPJ11
Given a numeric positive integer field with a maximum theoretical value of 100, which values would you use to verify that it works correctly?
Answer:
To verify that a numeric positive integer field with a maximum theoretical value of 100 works correctly, you can use a variety of test cases. Some possible test cases include:
The minimum possible value: 0
The maximum possible value: 100
A value near the minimum: 1
A value near the maximum: 99
A value in the middle of the range: 50
A prime number within the range: 67
A composite number within the range: 36
An odd number within the range: 73
An even number within the range: 72
A value that is not a number (e.g. "abc", "1.2", etc.): this is not a valid test case, as the field is for numeric positive integers only.
It is generally a good idea to test the boundaries and edges of the expected input range, as well as some values within the range, to ensure that the field is functioning correctly.
Explanation:
Suppose a variation of FFS includes in each inode 12 direct, 1 indirect, 1 double indirect, 2 triple indirect, and 1 quadruple indirect pointers. Assuming 6KB blocks and 6-byte pointers. a. What is the largest file that can be accessed via direct pointers only? Click or tap here to enter text. b. What is the maximum file size this index structure can support? Click or tap here to enter text.
Suppose a variation of FFS includes in each inode 12 direct, 1 indirect, 1 double indirect, 2 triple indirect, and 1 quadruple indirect pointers. Assuming 6KB blocks and 6-byte pointers.
a. Largest file that can be accessed via direct pointers only is 12 direct pointers per inode × 6KB/block = 72KB.
b. The maximum file size this index structure can support is: (12 × 6 KB) + (2 × 1024 × 6 KB) + (2 × 1024^2 × 6 KB) + (1024^3 × 6 KB) = 12 × 6 KB + 2 × 6 MB + 2 × 6 GB + 6 TB = 6.384 TB.
FFS is a file system used by BSD and derived operating systems like FreeBSD, NetBSD, OpenBSD, and macOS. The term FFS stands for Fast File System. It is a file system that is optimized for hard disks with a larger block size than those found on older hard drives. FFS is a block allocation technique that efficiently stores and organizes files on hard drives.
To learn more about pointers; https://brainly.com/question/29063518
#SPJ11
What can Amber do to make sure no one else can access her document? O Use password protection. O Add editing restrictions. O Use Hidden text. O Mark it as final.
1- How to enable arrow for faster conversions between pandas and pyspark dataframes?
1- How to transform pyspark dataframe in a pandas dataframe?
2- How to transform pandas dataframe in a pyspark dataframe?
To transform a CSV file into a PySpark DataFrame, we can use the read.csv() method provided by PySpark's SparkSession.
For an example, from pyspark.sql import SparkSession
spark = SparkSession.builder.app Name("CSVtoDF").getOrCreate()
df = spark.transform.csv("path/to/csv/file.csv", header=True, inferSchema=True)
To transform a JSON file into a PySpark DataFrame, we can use the read.json() method provided by PySpark's SparkSession.
For example:
from pyspark.sql import SparkSession
spark = SparkSession.builder.app Name("JSONtoDF").getOrCreate()
df = spark.transform.json("path/to/json/file.json")
To transform a Parquet file into a PySpark DataFrame, we can use the transform .parquet() method provided by PySpark's SparkSession.
For example:
from pyspark.sql import SparkSession
spark = SparkSession.builder.appName("ParquettoDF").getOrCreate()
df = spark.transform.parquet("path/to/transform /file.parquet")
Thus, in this example, we need to create a SparkSession object named spark.
For more details regarding Pyspark, visit:
brainly.com/question/29579693
#SPJ4
which of the following is not a use of a hash function?program execution optimization to make computers run fasterchecksums for integrity checkingerror correcting codes for data transmission optimizationlossy compression to reduce files sizes when fidelity is not required
The one that is not a use of a hash function is Lossy compression to reduce file sizes when fidelity is not required. Option C is correct.
The use of a hash function is to generate a unique fixed-size output (hash value) from an input of variable size. This output is used for various purposes, such as data indexing, security, and digital signatures.
Out of the given options, program execution optimization, checksums for integrity checking, and error correcting codes for data transmission optimization all make use of hash functions. However, lossy compression to reduce file sizes when fidelity is not required does not involve hash functions.
Instead, lossy compression algorithms discard some data to reduce file size, which can result in a loss of information. Hence, lossy compression is not a use of a hash function.
Therefore, option C is correct.
Learn more about hash function https://brainly.com/question/31579763
#SPJ11
Ms. Osteen gives her class an assignment to insert background color that gradually changes from blue to green. To accomplish this design
effect the students must add a:
O A. swatch.
OB. fill.
C. gradient.
D. pattern.
Need help
Answer:
C
Explanation:
a(n) ______ key is a special key programmed to issue commands to a computer.
A(n) function key is a special key programmed to issue commands to a computer.
What are Function keys?
The function keys, or F keys, are labeled F1 through F12 and run across the top of the keyboard. These keys function as shortcuts, performing tasks such as saving files, printing data, or refreshing a page.
In many programs, for example, the F1 key is frequently used as the default help key. The F5 key in an Internet browser is used to refresh or reload a web page. The function of these keys varies depending on the operating system and software program.
To know more about Function keys, visit: https://brainly.com/question/12168541
#SPJ1
Scrie un program care citind varstele a 2 copii afiseaza care dintre ei este cel mai mare si cu cat. Exemplu: Pentru varstele 5 si 9 se va afisa "al doilea copil e mai mare cu 4 ani"
Answer:
primul_copil = int(input("Introduceți vârsta primului copil: "))
aldoilea_copil = int(input("Introduceți vârsta celui de-al doilea copil: "))
def copilmai_mare(varsta1, varsta2):
if varsta1 > varsta2:
diferenta = varsta1 - varsta2
print("copilul mai mare este varsta1 cu diferența de vârstă de: ", diferenta )
else:
diferenta = varsta2 - varsta1
print("copilul mai mare este varsta2 cu diferența de vârstă de: ", diferenta )
copilmai_mare(primul_copil, aldoilea_copil)
Explanation:
Programul python de mai sus definește o funcție "copilmai_mare" care ia două argumente "varsta1" și "varsta2". Diferența dintre vârstele copiilor este comparată, iar cel mai mare copil și diferența sunt tipărite pe ecran.
A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.
a. true
b. false
Answer:
A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.
a. true
It is true that a threat vector is an item of code on a distributed device that reports the condition of the device to a central server. The correct option is a.
What is a threat vector?The total number of attack vectors that an attacker can use to manipulate a network or computer system or extract data is referred to as the attack surface.
Threat vector and attack vector are interchangeable terms that describe the various ways a hacker can gain access to data or other confidential information.
The methods used by adversaries to breach or infiltrate your network are referred to as attack vectors.
Malware and ransomware, as well as man-in-the-middle attacks, compromised credentials, and phishing, are all examples of attack vectors.
A threat vector is a piece of code on a distributed device that reports the device's status to a central server.
Thus, the correct option is a.
For more details regarding a threat vector, visit:
https://brainly.com/question/28558110
#SPJ2
Give three examples of the following types of data?
Give three examples for each category in the software domain ?
CCDI :)??
An example of transactional data are:
Sales ordersPurchase ordersShipping documentsIts software domain are: Personal meeting, a telephone call, and a Video call
An example of financial data are: assets, liabilities, and equity. The software are: CORE Banking, Retail Banking, and Private banking
An example of intellectual property data are: books, music, inventions. The software domain are Patents, trademarks, and copyrights
What types of software are used in the financial industry?Through sales and marketing tools, data-driven contact management, and workflow automation, customer relationship management (CRM) software assists financial services organizations in fostering new relationships and maximizing the value of existing customers.
You can see how your consumers are utilizing your website to complete a transaction by using transaction management software. It may demonstrate both how each website element functions on its own and as a part of the overall technological infrastructure.
Note that Information that is gathered from transactions is referred to as transactional data. It keeps track of the date and location of the transaction, the time it took place, the price ranges of the goods purchased, the mode of payment used, any discounts applied, and other quantities and characteristics related to the transaction.
Learn more about transactional data from
https://brainly.com/question/28081430
#SPJ1
Adnan is creating a presentation about engineers using geometric shapes in bridge construction. He wants to insert
an illustration of a bridge saved in a folder on his computer.
How can he access the folder using the images command group?
After choosing the illustration he wants to add, which button should he click?
Add
Insert
OK
Done
Intro
Answer:Click Pictures, Insert
Explanation:
Got it right
Answer:
A. A
B. B
Explanation:
Please Help!
What is typically used for input commands and uses a mathematical interpretation of human motion?
a. Gesture-based interaction
b. VoIP
c. Telepresence
Answer: Gesture-based interaction
Explanation:
Option a (Gesture-based interaction) is the correct alternative.
Interactions that exclusively use gestures and will have a complex gestured syntax need palm orientation or posture monitoring.Users can interact or communicate with such as user interface design by employing gestures by implementing interface design instead of using a code-centric approach.
Option b (VoIP) - Calling through wireless Broadband rather than just traditional telephone service would be possible with this equipment.
Option c (Telepresence) - Some technologies somehow allow individuals to seem present, or influence a location that they don't geographically occupy, such as the usage of virtual reality.
Thus the above option is the right one.
Learn more about Gesture-based interaction here:
https://brainly.com/question/4152303
A technician is performing routine preventative maintenance on a laser printer and has been asked by the client to check the printer's paper feeder for issues.
Which of the following printer parts should the technician check first for problems related to paper feeding? (Select TWO.)
a. Transfer belt
b. Toner cartridge
c. Pickup rollers
d. Tractor feede.
e. Separation pad
f. Print head
Laser printer and has been asked by the client to check the printer's paper feeder for issues, c. Pickup rollers and e. Separation pad.
Paper jams are usually caused by dirty, worn, or damaged rollers. Paper pickup rollers can be cleaned with alcohol or replaced if they are worn out. Similarly, separation pads can cause paper jams. The separation pad is responsible for ensuring that the paper feed rollers only take one page at a time. If the separation pad is worn or sticky, it will cause multiple pages to be fed through the printer at once. Separation pads can usually be cleaned or replaced if they are worn out.Answer in 200 words:Therefore, the technician should check the pickup rollers and separation pad first for paper feeding issues.
A laser printer has a lot of moving parts that are designed to work together. The paper feeder is one of these parts, and it's crucial to ensure that it's in good working condition. Laser printers are known for their ability to handle a lot of paper, and it's not uncommon for them to be used in environments where they're frequently printing. This means that the paper feeder is likely to get a lot of wear and tear, which can lead to problems like paper jams.If the paper feeder is not working correctly, it can cause paper jams, and it can also damage the printer itself. This is why it's essential to check the paper feeder regularly, and to ensure that it's functioning correctly. The technician should start by checking the pickup rollers and separation pad, as these are the most common causes of paper jams in a laser printer. If the issue is not resolved, the technician may need to investigate other parts of the printer, such as the transfer belt or toner cartridge, but it's essential to start with the paper feeder.
Learn more about printer :
https://brainly.com/question/5039703
#SPJ11