1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
9

How is a cell named?

Computers and Technology
1 answer:
bixtya [17]3 years ago
8 0
Im guessing a cell is named by the scientist that found that cell in the fist place.
You might be interested in
What is Processor to Memory Mismatch problem?
Gala2k [10]
Direct-mapped cache;
fully associative cache;
N-way-set-associative cache.
That is all I could find sorry I can’t help
8 0
3 years ago
How can investors receive compounding returns
ANTONII [103]
If you’ve ever had a savings account, you likely know that a few cents in interest every month barely adds up. The goal is “compounding returns,” which simply means that the interest you earn each month earns additional interest, which then earns even more interest. But although a savings account will help with that, you may be lucky enough to be able to afford a cup of coffee every 10 years or so at that rate. Instead, it’s important to find a way to invest your money in a high-interest account that will earn compounding returns.

I hope this helps you out ;)
3 0
3 years ago
which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
WARRIOR [948]

A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.

<h3>What is Host-Based IPS?</h3>
  • A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.
  • The Host-based Intrusion Prevention System (HIPS) guards against malicious software and other activities that aim to harm your computer. HIPS uses sophisticated behavioral analysis in conjunction with network filtering's detection capabilities to keep track of active programs, files, and registry keys.
  • The integrated endpoint security system known as endpoint detection and response (EDR), also referred to as endpoint threat detection and response (ETDR), combines real-time continuous monitoring and gathering of endpoint data with rules-based automated reaction and analysis capabilities.

To learn more about Host-Based IPS refer to:

brainly.com/question/20490376

#SPJ4

5 0
1 year ago
Patient letters created from __________ use structured data and do not require a large amount of typing from the medical assista
umka2103 [35]
Templates I think. not sure
3 0
3 years ago
4. In this problem, we consider sending real-time voice from Host A to Host B over a packet-switchednetwork (VoIP). Host A conve
mina [271]

Answer:

The time elapsed is 0.017224 s

Solution:

As per the question:

Analog signal to digital bit stream conversion by Host A =64 kbps

Byte packets obtained by Host A = 56 bytes

Rate of transmission = 2 Mbps

Propagation delay = 10 ms = 0.01 s

Now,

Considering the packets' first bit, as its transmission is only after the generation of all the bits in the packet.

Time taken to generate and convert all the bits into digital signal is given by;

t = \frac{Total\ No.\ of\ packets}{A/D\ bit\ stream\ conversion}

t = \frac{56\times 8}{64\times 10^{3}}          (Since, 1 byte = 8 bits)

t = 7 ms = 0.007 s

Time Required for transmission of the packet, t':

t' = \frac{Total\ No.\ of\ packets}{Transmission\ rate}

t' = \frac{56\times 8}{2\times 10^{6}} = 2.24\times 10^{- 4} s

Now, the time elapse between the bit creation and its decoding is given by:

t + t'  + propagation delay= 0.007 + 2.24\times 10^{- 4} s + 0.01= 0.017224 s

8 0
3 years ago
Other questions:
  • What sugar is used in a DNA molecule​
    7·2 answers
  • To have the most impact when using email, you should structure your messages so that
    5·1 answer
  • You can apply several different worksheet themes from which tab?
    10·2 answers
  • What is the difference between C and C++. If I know C, will it be hard to lean C++?
    15·1 answer
  • Which style did Jack use on the vocabulary words in reports?
    14·2 answers
  • The image below shows a weather service map
    13·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • Write a program that asks the user to enter two integer numbers X and Y. The program halves each number between X and Y then pri
    15·1 answer
  • What is the purpose of a report?
    12·2 answers
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!