1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
2 years ago
5

Help me with thissssss

Computers and Technology
1 answer:
4vir4ik [10]2 years ago
4 0

Answer:

2. 1 element of art I see in there is color and 1 principle is rhythm.

3. I agree not everything is for free you must earn it yourself.

4. I had earn greatest at my times table my speed is insanely fast when you ask a multipecation fact i'll answer it like in 1 sec or lesser.

You might be interested in
what is the largest possible number of internal nodes in a redblack tree with black height k? what is the smallest possiblenumbe
Elina [12.6K]

Answer:

A Red Black Tree is a type of self-balancing(BST) in this tree ,each node is red or black colored. The red black tree meets all the properties of the binary search tree, but some additional properties have been added to a Red Black Tree.

A Red-Black tree's height is O(Logn) where (n is the tree's amount of nodes).

In a red-black tree with black height k

The maximum number of internal nodes is 2^{2k} -1.

The smallest possible number is 2^{k} -1.

7 0
3 years ago
How does the medium affect the amplitude of sound?
Ratling [72]

The amplitude of a sound energy depends upon the how much energy we are giving to the wave or how much compression on the wave is taking place.

It does’t depends upon the wave length,frequency


7 0
3 years ago
A huge variety of networking hardware and software appeared. One challenge was to enable these different networks to communicate
madam [21]

Answer:

Internet Protocol (IP)

Explanation:

The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

6 0
3 years ago
An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two
Marysya12 [62]

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

  • A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.
  • Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

5 0
3 years ago
Which file formats are used for importing and exporting data from OpenOffice Base?
Gennadij [26K]

Answer:

Examples of The file formats used for importing and exporting data from open office are:

  • Open Document formats (.ods and .ots )
  • Impress
  • star-writer formats ( .sdw,.sgl and .vor)

In open-office base you can import data from a Database file ( C )

you can export to a spreadsheet ( A )

Explanation:

An open-office base is a fully designed desktop database management system. it is designed to serve a very large number of users especially in a firm. it can be used to track personal CD's and even used to produce monthly/yearly sales report for any department in the firm.

It is designed with JAVA as the programming language and it can run on most operating systems like: Linux windows and Mac    

5 0
3 years ago
Read 2 more answers
Other questions:
  • ____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen.
    12·2 answers
  • What is the name of the port that you plug an ethernet network cable into?
    6·1 answer
  • What does social protocol means in network?
    9·1 answer
  • Select the correct answer from each drop-down menu. Look at Marta's email signature and fill in the missing elements. Marta D'Ab
    14·2 answers
  • If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta
    8·1 answer
  • Hi guts gyt edgsahgflefljwegfwygafbhdshdnvcashD
    13·1 answer
  • A(n) _______ gate provides an output of 1 if either or both inputs are 1.
    14·2 answers
  • Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory,
    11·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    6·1 answer
  • a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!