1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
2 years ago
13

In addition to letting people share files, what is the most useful feature of

Computers and Technology
1 answer:
bekas [8.4K]2 years ago
5 0

Explanation:

B. They combine and compress large files into a zip file for sending through email

You might be interested in
How many bits can a memory chip with the below configuration support? For full credit, show how you got the answer.
tatiyna

Answer:

Total Memory= 4 KB = 4096 bytes = 32768 bits

Explanation:

<em><u>1. Data lines are 8 From D0 to D7</u></em>

so

Total memory at single address locations is 8 bits.

<em><u>2. Address lines are 12 (A0 to A11)</u></em>

There are 12 address lines but 3 out 12 are for selction of chip or memory bank.

so only 9 pins are there to address the locations on one chip.

Total No. of address locations on single chip = 2^9 = 512 locations

as 1 location is 1 byte so total memory of single chip is 512 bytes.

<u><em>3. Total Memory Bank </em></u>

There are total 3 selection pins for memory bank.

so

Total chips = 2^3 = 8.

<em><u>4. Total Memory </u></em>

Total size of 1 chip = 512 bytes

Total size of 8 chip = 8x512 bytes = 4096 bytes = 4096/1024 kb = 4 kb

<em>So total memory of system is 4 Kb = 4096 bytes = 32768 bits</em>

5 0
3 years ago
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling,
Fittoniya [83]

Answer:

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

Explanation:

Consider the given information.

A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

7 0
3 years ago
What is unit testing? a. Checking that the integer values of a function use proper units (yards, meters, etc.) b. Ensuring a pro
egoroff_w [7]

Answer:

d. Individually testing a small part (or unit) of a program, typically a function, using a separate program called a test harness.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

Unit testing can be defined as a software development procedure that involves the process of individually testing a small part (or unit) of a program, typically a function, using a separate program called a test harness.

This ultimately implies that, if the observed behavior of the small part of a software program is consistent with the expectations, then the unit test is considered a pass. Otherwise, the unit test failed.

8 0
3 years ago
Which compound is obtained by the oxidation of primary alcohol with nascent oxygen​
Nookie1986 [14]

answer:

what

Explanation:

8 0
3 years ago
6. What are the arguments, pros and cons, for Python's use of indentation to specify compound statements in control statements
Nat2105 [25]

Answer:

beinggreat78~here~to~help.

In some cases, one con is that it can be hard to keep track of your identation when coding long lines or blocks. The pro is that you may need to learn, which is not a bad thing. Learning is good.

5 0
3 years ago
Other questions:
  • The opening of the throttle plate can be delayed as long as
    13·1 answer
  • The following program includes fictional sets of the top 10 male and female baby names for the current year. Write a program tha
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • list out the application of the computer and explain it?(and as the answer for this question as image) ​
    7·1 answer
  • Quality answers will be appriciated! :)​
    15·2 answers
  • HELP!!!!!!!! my keyboard keeps acting up every time I press a random key on my keyboard when it stops working it works perfectly
    9·1 answer
  • PLEASE HELP ASAP
    15·1 answer
  • mips Write a program that asks the user for an integer between 0 and 100 that represents a number of cents. Convert that number
    6·1 answer
  • The value of a variable can change multiple times during the execution of a computer program.
    8·1 answer
  • Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!