1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
3 years ago
5

The name atari comes from what

Computers and Technology
1 answer:
algol [13]3 years ago
3 0

Answer:

JAPANESE

Explanation:

Have a nice day:)

You might be interested in
What will happen when you run this program?
Elenna [48]

Answer:

C. Infinite loop

Explanation:

num will be printed continuously since it will always be bigger than 0 (10 is greater than 0, satisfying the condition num > 0) making it an infinite loop since it will go on forever.

Hope this helps :)

4 0
3 years ago
Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
Ostrovityanka [42]

As we know that 10-bAse data travels at the rate of 10 mbps, therefore at 1 sec we have 10240 bytes.

We have to calculate for 64 bytes travelling in one second. Multiply both sides by 64.

64 sec = 10240 x 64 bytes

64 bytes = 64 / 10240 sec

Now we have to calculate for light of speed

1 sec = 186000 miles

Substitute this value to the formula above

64 bytes = 64 / 10240 x 1 sec = 64 / 10240 x 186000 miles = 64 / 10240 x 186000 x 5280 feet = 6138x10^3 feet

Therefore, 64 bytes is equal to 6138 x 10^3 feet long message

3 0
3 years ago
By definition, what is the process of reducing security exposure and tightening security controls?
saw5 [17]

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

7 0
2 years ago
1- How should an operating system support communication between applications? explain your reasoning?
Luba_88 [7]

<u>Explanation:</u>

An operating system support communication between applications through regions of memory shared between the applications. For example, a computer's RAM (random access memory) allows each running application to use a portion of the computer's memory.

7 0
3 years ago
Explain input device​
Kamila [148]

Answer: ......wlc;)

Explanation: Any information or data sent to a computer for processing is considered input. Input or user input is sent to a computer using an input device. The picture is an illustration of the difference between input and output. The input example (top) shows data being sent from a keyboard to a computer

4 0
3 years ago
Read 2 more answers
Other questions:
  • The ____ operation is used to add an element onto the stack.
    15·1 answer
  • To insert a clip art you must do the following
    14·1 answer
  • Sam wanted to open a file that he saved yesterday. Which component inside the computer stores this file? the hard drive the fax
    13·2 answers
  • What is a nonlinear presentation
    9·2 answers
  • Explain why it is not necessary for a program to Explain why it is not necessary for a program to be completely free of defects
    13·1 answer
  • Why is data processing done in computer?​
    14·1 answer
  • LAB: Convert to binary - methods
    11·1 answer
  • To have a reason or purpose to do something
    8·2 answers
  • Hi who plays among us
    9·1 answer
  • What does the top level domain in a url inducate? A. The organization or company that owns the website. B. The organization or c
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!