1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
6

Explain how a touris could use QR codes at an airport to help plan a holiday

Computers and Technology
1 answer:
elena55 [62]3 years ago
8 0

Answer:

with tech

Explanation:

You might be interested in
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
bogdanovich [222]

Answer:

D. HIPAA (Health Insurance Portability and Accountability Act)

Explanation:

HIPAA which stands for Health Insurance Portability and Accountability Act, is an act designed by the US government in 1996 to guard patients' confidential health information and also implement policies and procedures to safeguard it. The act contains the required information and instruction for handling patients' medical health information. The law however gives patients (or their representatives) the right to access these information which as a matter of fact must be made available within 30 days from the day of request.

PS: Not sure why the option D in the question contains ' FTF '. I have taken it to be a typo because without it, the option is in itself complete.

7 0
3 years ago
How does the CSMA/CD protocol resolve when two network adapters on the same network transmit at the same time?
KengaRu [80]

Answer:

If two network adapters on the same network transmit at the same time, one of the adapters would stop transmitting until the second adapter has finished transmitting before retransmission

Explanation:

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network protocol used to prevent data collision. CSMA/CD detects collisions by sensing transmissions from other nodes. If a collision is detected, the node stops transmitting, sends a jam signal, and then waits for some time until the channel is idle before retransmission.

If two nodes on the network start transmitting at the same time, the nodes will detect the collision and take the appropriate action.

If two network adapters on the same network transmit at the same time, one of the adapters would stop transmitting until the second adapter has finished transmitting before retransmission

4 0
2 years ago
A computer has a cache and main memory. 20 ns are required to reference a word that is in the cache. If the word is in main memo
Alecsey [184]

Answer:

T_{average} =12026ns

Explanation:

Given Information:

T_{cache}=20 ns

T_{main}=60ns

T_{disk} =12ms=12,000,000ns

hit_{cache} =0.9

miss_{cache} =1-0.9=0.10

hit_{main} =0.99

miss_{main} =1-0.99=0.01

There are 3 possible cases

1. Location of reference word is in cache

T_{cache}*hit_{cache} =20*0.9=18ns

2. Location of reference word is not in cache but in main memory

(T_{cache}+T_{main})*(miss_{cache}*hit_{main}) =(20+60)*(0.10*0.99)=7.92ns

3. Location of reference word is neither in cache nor in main memory

(T_{cache}+T_{main}+T_{disk})*(miss_{cache}*miss_{main})

(20+60+12,000,000)*(0.10*0.01)=12000.08 ns

The average time required to access a referenced word on this system is simply the sum of above 3 cases

T_{average} =18+7.92+12000.08=12026ns

5 0
3 years ago
What are the difference between data and information?​
nevsk [136]

Answer

The terms data and information can mean different things in different contexts, but the main differences between them are: Data is a collection of facts. Information is how you understand those facts in context. Data is unorganized, while information is structured or organized.

4 0
3 years ago
It is always safe to enter personal information into a pop-up window. true or false.
Rufina [12.5K]
False ( it's never safe to enter personal information into a pop window cause hacker always around us)
4 0
3 years ago
Other questions:
  • Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then con
    10·1 answer
  • You use_____ to view an XPS file
    10·1 answer
  • You visit two websites about inventions of the 21st century. One has .edu in the URL address and the other has .com. Which site
    6·2 answers
  • What pressure will be shown on the high side peessure gauge (ac system on)
    12·1 answer
  • HURRY UP !!!!!!’<br> Each packet is addressed to the recipient's .
    8·1 answer
  • In python,_______ are used to define the conditions necessary for a while loop to run.
    7·2 answers
  • A type of storage which holds data on a permanent basis for later use<br><br><br><br> Help please
    8·1 answer
  • Which of the following best describes the basic purpose of the internet?
    11·1 answer
  • Correct all the mistakes in the following sentence:
    15·2 answers
  • Please help me idk I suck at this stuff ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!