1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
1 year ago
7

Select all the correct answers.

Computers and Technology
1 answer:
s2008m [1.1K]1 year ago
7 0
Investigates the formation process of rocks
measures earthquakes and tsunamis
You might be interested in
Which network is the predecessor of the Internet?
disa [49]
The predecessor of the internet is ARPANET better known as Advanced Research Project Agency
4 0
3 years ago
The energy used by an appliance which operates at 240 volts at 15 amp for 4 hr. is A. 0.92 kwhr. B. 3.45 kwhr. C. 14.4 kwhr. D.
Tju [1.3M]

Answer:

C. 14.4 kwhr.

Explanation:

To calculate the energy used by appliance first calculate the power. The formulae for calculating power(<em>P</em>) is P= I \times V, where V stands for voltage and I stands for current.

In the given problem,  V = 240 volts and I = 15 amp. Therefore,

P=240 \times 15 =3600\ watt(w) = 3.6\ kw

Now, formulae for calculating energy used i.e. work(W) is W = P\times t, where <em>t</em> is the time.

In the given question time is 4 hr. Therefore energy used will be,

Energy used (W) = 3.6\times4 =14.4\ kwhr.

8 0
3 years ago
Assume that ip has been declared to be a pointer to int and that enrollment has been declared to be an array of 20 elements . As
Vitek1552 [10]

Answer:

ip = enrollment + section;

Explanation:

The variable ip has been declared to be a pointer to int.

int * ip;

The variable enrollment has been declared as an array of 20 elements .

int enrollment[20];

The variable section has been declared as an int.

int section;

In order to make ip point to the element in the array indexed by section, we can use the following statement :

ip = enrollment + section;

This will make ip point to enrollment[section].

5 0
3 years ago
To ____ a public member function of a base class in the derived class, the corresponding function in the derived class must have
Norma-Jean [14]

Answer:

None of the mentioned options

Explanation:

  • If we define a method in a derived class with same declaration type as that of base class then it is said to be overriding a function which behaves differently which will depend on the object which is calling the method.
  • Option a,b and c are not any kind of methods we implement using coding.
  • Option d is done when number or data types of parameters are different than the declaration of the base type.

8 0
3 years ago
_____ allow you to logically separate ports in switches to create subdomains without wiring your network as physical subdomains.
AlladinOne [14]

Answer:

The correct answer for the following question is VLAN.

Explanation:

It stands for Virtue Logical Area Network which allows you to group port on a switch logically. VLANs can be extend across (a period of time) multiple switches means you used to express on port that you're in that VLAN by changing the VLAN number.

We have the ability to improve our security with VLANs by controlling what VLAN is accessing with the other network of VLANs. So that this network is particularly helpful in office situation to create subdomain without wiring physical domain as your network.

6 0
2 years ago
Other questions:
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • _______ allow(s) you to apply colorful, eye catching designs to a presentation all at once. A. Themes B. Slide orientation C. Th
    10·2 answers
  • Instagram
    9·1 answer
  • . If you have written the following source code:
    9·1 answer
  • Select the correct text in the passage. George is working as a lead team lead. Which statements correctly describes the skills t
    12·1 answer
  • Write a java program that would request user name, id number, and state the time the user has reported at work.​
    12·1 answer
  • What are the steps to customize a slide show?
    10·2 answers
  • ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
    12·1 answer
  • Is a device used to test the network connection.
    11·2 answers
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!