1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
2 years ago
7

I need help here thanks forever who helps

Computers and Technology
1 answer:
lubasha [3.4K]2 years ago
3 0

Answer:

the horse, the man, and the cactus

Explanation:

The horse is running

The man got slung off the horse, so its in motion

The cactus is flying everywhere from the horse.

You might be interested in
suppose one packet switches between a sending host and a receiving host. the transmission rates between the sending host and the
ICE Princess25 [194]

The total end-to-end delay to send the packet length is L/R1 + L/R2. When using store-and-forward packet switches, the end-to-end delay is calculated as d = N × L/R.

<h3>How can you determine a packet's end-to-end delay?</h3>
  • When using store-and-forward packet switches, the end-to-end delay for sending a single packet of length L across N connections, each with a transmission rate R, is d = N × L/R. (Queuing, propagation delay, and processing time are all ignored).
  • The amount of time it takes a packet to travel from source to destination across a network is known as one-way delay (OWD).
  • It is a term that is commonly used in IP network monitoring. It differs from round-trip time (RTT) in that it only measures the journey from source to destination in one direction.
  • Propagation delay is the amount of time it takes for one bit to travel from the sender to the receiver end of a link.
  • Propagation delay is defined mathematically as the distance between sender and receiver. Propagation delay ∝ 1 / transmission speed.

To learn more about One-way delay, refer to:

brainly.com/question/27217941

#SPJ4

6 0
1 year ago
What happens when the computer is thrashing? quizzlet?
lutik1710 [3]
When computers need to use more memory than have RAM, they'll swap out pages of memory to their drive. When they need those memory pages, they'll swap out others and swap in the needed ones. If a computer needs enough additionall memory, it can get so busy swapping that it doesn't have any (or very little) time to do any useful work. That is called thrashing.

Unix calls swapping swapping. Windows calls it paging, probably because of the memory pages. Memory pages are 4096 (4KB) sections of memory.

Unix drives are usually partitioned with a swap partition, and swap files can be made in the filesystem. Windows just has pagefiles[s].
5 0
3 years ago
Your welcome 95 points gg
STatiana [176]

Answer:

tysm :))

Explanation:

have a great day

4 0
3 years ago
Read 2 more answers
Define additional characteristics such as font weight or style for an html tag
Bas_tet [7]
<span>Define additional characteristics such as font weight or style for an html tag:
- attributes</span>
4 0
3 years ago
How should you respond to the theft of your identity cyber awareness.
antiseptic1488 [7]

The way to respond to the theft of your identity cyber awareness is; To report the crime to the local commission which is the Federal Trade Commission (FTC).

<h3>Protection from Identity Theft</h3>

Identity Theft is basically a crime that happens happens when someone steals your personal information and uses it commit a fraudulent offence.

Now, the person that stole your identity may use the stolen information he got from you to apply for credit, file taxes, medical services or other government privileges.

The acts perpetuated above by the thief could lead to damage to your reputation with credit status and your good name too which could take years to rebuild.

Thus, it is very pertinent to report any case of such to the relevant government commission which in this case is Federal Trade Commission (FTC).

Read more about Identity Theft at; brainly.com/question/15252417

5 0
3 years ago
Other questions:
  • What is the opening page of a website called?
    9·2 answers
  • Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
    6·1 answer
  • When I comes to saving money, what is good rule of thumb
    5·1 answer
  • Write a program that scores a blackjack hand. In blackjack, a player receives from two to five cards. (The player decides how ma
    5·1 answer
  • What is f(-3) for the function f(a)=-2a2-5a+4?​
    10·1 answer
  • How would you convert an integer value to a float value in Python?
    10·1 answer
  • You have heard that it is possible to improve your computer's performance by storing all related files for a particular program
    9·1 answer
  • After assembling a computer system the very first software to be installed is​
    10·2 answers
  • Describe how to find and replace a text in a document​
    13·1 answer
  • state an application that would be better to write c++ than java and give a rationale for your answer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!