1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
3 years ago
7

What is the best method for collecting information from a source?

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
6 0
I personally think that summarizing important points is the way to go!
You might be interested in
What is the difference between front-end and back-end?
IgorLugansk [536]

Front-end the part with which the user interacts.

usually people who write this are called layout designers what languages ​​are used (Html, css, js)

Beck-end The northern part is the structure of the site due to which it works, this includes the DBMS, logic, etc. which languages ​​will be used(python, php, java)

People who can do both are called: full stack developr

3 0
2 years ago
Suppose the sender wants to send the following bit stream by using bit stuffing. What would the sender transmit if the following
Helen [10]

The purpose of bit stuffing is used as a delimiter to mark the end of one frame and the beginning of the next frame.

<h3>What is Bit Stuffing?</h3>

This refers to the use of one or more information bits in order to break up the message for easy synchronization.

The parts of a frame are:

  1. Frame header
  2. Payload field
  3. Trailer
  4. Flags.

<h3>What is a Flag?</h3>

This is a bit pattern that is used to define the start and end bits in a given frame and the 8-bit pattern 01111110 as the flag is commonly used.

Hence, we can see that your question is incomplete so I gave you a general overview to help you have a better understanding of the concept.


Read more about bit stuffing here:

brainly.com/question/12949292
#SPJ1

7 0
2 years ago
Write an expression that continues to bid until the user enters 'n'. Sample output with inputs: 'y' 'y' 'n' I'll bid $7! Continu
Likurg_2 [28]

Answer:

#include <iostream>

#include <cstdlib>  

using namespace std;

int main() {

  char Keep_Going = '-';

  int nextBid = 0;

  srand(5);

  while (Keep_Going != 'n') { //<-- solution

     nextBid = nextBid + (rand()%10 + 1);

     cout << "I'll bid $" << nextBid << "!" << endl;

     cout << "Continue bidding? ";

     cin >> Keep_Going;

  }

  cout << endl;

  return 0;

}

4 0
3 years ago
Write three guidelines to help you keep track of your behavior as you use different apps with
Gala2k [10]

Answer:

A basic guideline plan to help me track my behavior consist of the following:

How much time do I use each element?

Have I experienced anxiety after using them?

Have I experienced anxiety while using them?

Have I changed my day to day routine by using them?

Explanation:

The reasons to back my answer are the following. First of all, dependency can be measured in time spent and anxiety developed after the use of the element. Thus, we need to explore if the source of media has originated anxiety while using it or after using t to spot if we are suffering an addictive pattern. Also, generally addictive elements create anxiety while using it and it increases after stop using them. Therefore, if we find that we have experienced both types of anxiety we are in an addictive cycle.

4 0
3 years ago
. Use one command to create a /sales directory with the permissions of 770
mars1129 [50]

Answer:

mkdir -m 770 sales

Explanation:

The command mkdir is used to create a directory and the attribute or flag

-m is used to  assign permissions on create a folder.

Example:

mkdir -m 770 sales

Create a folder with permissions 770 with name sales

7 0
3 years ago
Other questions:
  • You use different office apps to accomplish specific tasks, such a creating a newsletter or producing a sales presentation, yet
    8·1 answer
  • Explain how being a metal, metalloid, or non-metal affects conductivity
    10·1 answer
  • Your computer will organize files into
    6·2 answers
  • Recursion occurs when a function (calls itself/ calls another function/ calls a function from the python standard library)
    5·1 answer
  • Could someone please help me with this?
    8·1 answer
  • What is a mod in programming?<br><br> Give more Java questions
    12·1 answer
  • Select the correct answer from each drop-down menu.
    5·2 answers
  • If you're a beginner to data analysis, what is the first thing you should check when you build data queries?
    11·1 answer
  • Custodial workers that access the terminal area must have a fingerprint background check done and training unless they are escor
    15·1 answer
  • security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!