1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
1 year ago
14

What was one effect of better printing methods during the Ming Dynasty? Updated trade routes A new merchant class Increased lite

racy rates More codes and laws
Computers and Technology
1 answer:
defon1 year ago
8 0

The one effect of better printing methods during the Ming Dynasty For millennia its mastery made China the only withinside the international capable of produce copies of texts in splendid numbers and so construct the biggest repository of books.

<h3>What have been 3 consequences of the printing revolution?</h3>

Printed books have become extra conveniently to be had due to the fact they have been less difficult to supply and inexpensive to make. More humans have been capable of learn how to study due to the fact they may get books to study.

  • As in Europe centuries later, the advent of printing in China dramatically diminished the fee of books, for that reason assisting the unfold of literacy.
  • Inexpensive books additionally gave a lift to the improvement of drama and different kinds of famous tradition.
  • Freed from time-ingesting hand copying, the unfold of tradition and know-how accelerated, ushering international civilization onto a brand new stage.

Read more about the Ming Dynasty:

brainly.com/question/8111024

#SPJ1

You might be interested in
Create a class named Employee. The class must contain member variables for the employee name and salary. It should contain gette
Lerok [7]

Answer:

Explanation:

The following code was written in Java. The code contains the Employee class which contains the two variables (name, salary), the constructor, getter and setter methods for both variables, and an overwritten toString method. It also contains a tester class with the main method inside and creates a Employee object and initializes it. Then it calls the toString method. The output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

8 0
3 years ago
Explain why you cannot the Apple OS install on a regular windows computer and vice versa, without the aid of a virtualization so
Phoenix [80]

Answer:

The reason is due to proprietary design of the Operating System (OS) which require a virtualization software to blanket or "disguise" the hardware (processor) borderlines of the computer onto which it is to be installed.

Explanation:

An Apple system that has the RISC processor and system architecture which has an operating system made entirely for the Apple system architecture

If the above Apple OS is to be installed on a windows computer, then the procedure to setup up the OS has to be the same as that used when on an Apple system, hence, due to the different processors and components of both systems, a virtualization will be be needed to be provided by a Virtual box, Parallels desktop or other virtualization software.

6 0
3 years ago
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
3 years ago
What is the difference between the ISO and the OSI?
geniusboy [140]

ISO it is an organzation for agreement on internationational of network communication worldwide

OSI is the model for understanding and designing a network architecture

7 0
3 years ago
Read 2 more answers
Convert A4B from hexadecimal to binary. Show your work.
Rama09 [41]

Answer:

The answer is A4B₁₆ =  2635₁₀ =  101001001011₂

Explanation:

To convert from hexadecimal base system to binary base system, first you can do an intermediate conversion from hexadecimal to decimal using this formula:

where position of the x₁ is the rightmost digit of the number and the equivalents hexadecimal numbers to decimal:

  • A = 10.
  • B = 11.
  • C = 12.
  • D = 13.
  • E = 14.
  • F = 15.

A4B₁₆ = A*16²+4*16¹+B*16⁰ = 2560 + 64 + 11 = 2635₁₀

Now, you have the number transformed from hexadecimal to decimal. To convert the decimal number 2635 to binary: Divide the number repeatedly by 2, keeping track of each remainder, until we get a quotient that is equal to 0:

2635 ÷ 2 = 1317 + 1;

1317 ÷ 2 = 658 + 1;

658 ÷ 2 = 329 + 0;

329 ÷ 2 = 164 + 1;

164 ÷ 2 = 82 + 0;

82 ÷ 2 = 41 + 0;

41 ÷ 2 = 20 + 1;

20 ÷ 2 = 10 + 0;

10 ÷ 2 = 5 + 0;

5 ÷ 2 = 2 + 1;

2 ÷ 2 = 1 + 0;

1 ÷ 2 = 0 + 1;

Now, construct the integer part base 2 representation, by taking the remainders starting from the bottom of the list:

2635₁₀ =  101001001011₂

3 0
3 years ago
Other questions:
  • What is the basic unit for storing data in exel
    10·1 answer
  • If a friend changes the password on your phone how do you get into it if you dont know the password
    12·1 answer
  • In class, we discussed static local variables in C. Answereach question below; if necessary, find and consult a reference on the
    10·1 answer
  • How have productivity programs improved the professional lives of people? (check all that apply)
    8·2 answers
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • Next, Kim decides to include a diagram of a frog’s life cycle in her presentation. She wants to use an image that is part of a p
    15·2 answers
  • Consider the following code segment.
    11·1 answer
  • Consumer consequences for illegally downloading software
    6·1 answer
  • Podcasts can only be created by professional organizations
    11·2 answers
  • I was just called a man in a wig ugh <br><br> Any tips for doxxing someone?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!