1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_tiger [21]
3 years ago
12

Please help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Computers and Technology
2 answers:
Pie3 years ago
8 0
I'd say PCIe x1... in terms of preformance
SashulF [63]3 years ago
5 0

Due to it having several expansion slots and ports, it would mostly connect well with the PCIe x16. :)

You might be interested in
Which feature of a blog allows an author to interact and get feedback from his or her readers? link pingback commenting TweetMem
poizon [28]
Commenting. When someone comments of a blog the blog's writer can comment back, to answer questions, etc.
6 0
3 years ago
Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the cont
Fynjy0 [20]

Answer:

batch sequence check.

Explanation:

A batch sequence check can be defined as a strategic and systematic control plan which typically involves the process of inputting a range of numbers comprising a batch and then inputting each serially numbered document.

The steps for checking an event data within a batch using a batch sequence check include the following;

I. You'll enter a range of serial numbers of the document in a batch.

II. You'll enter each serially pre-numbered document one after the other.

III. The input documents are sorted by a computer into a serial (numerical) order, match the sequence number range against the input documents, and then reports any part of the document that is missing, a duplicate and out of range.

6 0
3 years ago
2. When a business practices offensive behavior, you have many options. The option with the loudest voice is
Andreas93 [3]
—-_-__-____- _—-_- -__-_-____-__




___-_-_ _- —|
4 0
2 years ago
Simple geometry can compute the height of an object from the the object's shadow length and shadow angle using the formula: tan(
agasfer [191]

Answer:

The program to this question can be given as:

Program:

#include <stdio.h>  //include header files

#include<math.h>

int main()    //main method  

{        

   double treeHeight = 0.0;         //declare variables

and assign value

   double shadowLength = 0.0;  

   double angleElevation =  0.11693706;

   // (0.11693706 radians = 6.7 degrees) convert number into angle.      

   shadowLength = 17.5;  

treeHeight = shadowLength * tan(angleElevation);   //convert number into angle

   printf("Tree height: %lf\n", treeHeight);   //print value.

   return 0;  

}

Output:

Tree height: 2.055778

Explanation:

In the above C language program firstly we include the headers. In this header file, we include a (math.h) header file this file helps to use the math function. Then we declare the main method in the main method we declare the variable that is given in the question that are treeHeight, shadowLength , angleElevation. All the variable datatype is double because it stores the floating-point value. Then we apply the formula that is  treeHeight = shadowLength * tan(angleElevation). In this formula, the treeHeight variable holds the value. Then we print the variable value for print the double value we use the lf(that is long float).

7 0
3 years ago
What is 1 TB equal to ?<br> . 1024 kb<br> .1024 gb <br>. 1024 pb <br>. 1024 mb​
OLEGan [10]

\large \mathfrak{Answer : }

1 TB = 1024 GB

3 0
3 years ago
Read 2 more answers
Other questions:
  • A deleted file or folder is not permanently deleted from a computer until which event occurs? The computer is restarted. The Rec
    13·2 answers
  • System Architecture: Describe the system architecture. Specifically, be sure to address the corporate organization and culture,
    10·1 answer
  • What is the purpose of a mail merge field?
    9·2 answers
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • White lines
    7·2 answers
  • What happens when text is added to grouped objects that is larger than an object ?
    9·2 answers
  • QUESTIONS Which of the following use cases are suitable for compute-optimized cloud offering? ОА. None of the listed O B. Highly
    12·1 answer
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • Which statement about intellectual property is true? (CSI-7.6) Group of answer choices It is okay to use code you find on the in
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!