1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aalyn [17]
3 years ago
9

Which Of The Following Is A College Major For Which IT Courses Would Most Likely Be Required?

Computers and Technology
1 answer:
german3 years ago
3 0

Answer:

Most likely computer science, however we cant see the options so i dont know but if that is not one of the options then the answer will most likely be engineering

Explanation:

You might be interested in
Select the correct answer. Which input device uses optical technology?
daser333 [38]

Answer:

barcode reader is the correct answer

8 0
3 years ago
Consider an error-free 64 kbps satellite channel used to send 512 byte data frames in one direction, with very short acknowledge
Vladimir [108]

Answer:

The answer is "2".

Explanation:

In the given question some information is missing, that is "The propagation time for satellite to earth" which is "270 milliseconds" so, the description to this question can be defined as follows:

Given values:

Bandwidth = 64 kbps

Data frames = 512 bytes  

Propagation Time (t​​​​​​p ) =270 ms

Change Bandwidth  kbps to bps:

1 kb= 1024 bytes

calculated bandwidth= 64 kbps = 64×1024 bps = 65536 bps

1 bytes = 8 bits

512 bytes = 512 × 8 =  4096 bits

Frame length = 4096 bits

Formula

Transmission time (T​​​​​​t) = Frame length /Bandwidth

Window size = 1+2a

where a = Propagation time/Transmission time

Calculate Transmission time:

Transmission time (T​​​​​​t) = 4096 / 65536

Transmission time (T​​​​​​t)= 625 m.sec

Calculate Window size:

Window size = 1+2(270/625)

Window size = 1+2(0.432)

Window size = 1+0.864

Window size = 1.864

Window size = 2

3 0
3 years ago
Fill in the blank to complete the sentence. -------------------- is used to store and process data over the Internet using compu
Trava [24]

Answer:cloud computing

Explanation:

6 0
3 years ago
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
3 years ago
Characteristics of a cohesive group include all of the following EXCEPT: a. ​support b. a lack of bonding c. mutuality within th
Brilliant_brown [7]

Answer:

Option B i.e., a lack of bonding is the correct answer.

Explanation:

Cohesion is defined as the ability to work in a group, so many time the following situation or problems that are lack of bonding occurs between the mates or the group members because while they achieving their goals there is the understanding problem may occur between them or sometime their ideas should be a mismatch.

4 0
4 years ago
Other questions:
  • Select the correct answer.
    8·2 answers
  • Sedimentary rock formation occurs when igneous, metamorphic, or other sedimentary rocks are exposed to the unyielding forces of
    14·2 answers
  • Taking a suitable example in c language explain the of call by value and call by reference concepts.
    7·1 answer
  • Which command compiles the Java source code file Welcome.java?
    11·1 answer
  • Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and Host B each send a UDP segment to Ho
    8·1 answer
  • The auxiliary device used to store large volume of data and program for future is called​
    10·1 answer
  • As we move up a energy pyrimad the amount of a energy avaliable to each level of consumers
    10·1 answer
  • What is a best practice when approaching an automation effort?
    6·1 answer
  • BRIANLIEST!!!!!!!!!!!!!!!!
    12·2 answers
  • I was just called a man in a wig ugh <br><br> Any tips for doxxing someone?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!