1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RSB [31]
3 years ago
6

The menu bar displays information about your connection process, notifies you when you connect to another website, and identifie

s the percentage of information transferred from the web server to your browser.
)true
)false
Computers and Technology
1 answer:
Annette [7]3 years ago
7 0

The menu bar of what exactly? That's pretty vague.

You might be interested in
Write a function that implements another stack function, peek. Peek returns the value of the first element on the stack without
devlian [24]

Answer:

See explaination

Explanation:

StackExample.java

public class StackExample<T> {

private final static int DEFAULT_CAPACITY = 100;

private int top;

private T[] stack = (T[])(new Object[DEFAULT_CAPACITY]);

/**

* Returns a reference to the element at the top of this stack.

* The element is not removed from the stack.

* atreturn element on top of stack

* atthrows EmptyCollectionException if stack is empty

*/

public T peek() throws EmptyCollectionException

{

if (isEmpty())

throw new EmptyCollectionException("stack");

return stack[top-1];

}

/**

* Returns true if this stack is empty and false otherwise.

* atreturn true if this stack is empty

*/

public boolean isEmpty()

{

return top < 0;

}

}

//please replace "at" with the at symbol

Note:

peek() method will always pick the first element from stack. While calling peek() method when stack is empty then it will throw stack underflow error. Since peek() method will always look for first element ffrom stack there is no chance for overflow of stack. So overflow error checking is not required. In above program we handled underflow error in peek() method by checking whether stack is an empty or not.

3 0
4 years ago
Given a effective delay of 99ms when network usage is 74%, what is the effective delay when network usage = 84% ?
NARA [144]

148.5 ms is the effective delay when network usage = 84% .

<h3>what is a computer network?</h3>
  • A group of computers sharing resources that are available on or offered by network nodes is known as a computer network.
  • Over digital links, the computers communicate with one another using standard communication protocols.
  • These connections are made up of telecommunication network technologies, which are based on physically wired, optical, and wireless radio-frequency means and may be set up in a number of different network topologies.
  • Personal computers, servers, networking equipment, and other specialized or general-purpose hosts can all function as nodes in a computer network.
  • They can have hostnames and are identifiable by network addresses.
  • After being assigned, hostnames act as recognizable labels for the nodes and are seldom updated.
  • Network addresses are used by communication protocols like the Internet Protocol to locate and identify the nodes.

To learn more about the topic, refer to the following link

brainly.com/question/8118353

#SPJ4

3 0
2 years ago
La tensión en Newtons necesaria para que una onda transversal cuya longitud de onda es​
Karolina [17]

hola no conozco el toldo, pero necesito puntos cerebrales tan lo siento

Explanation:

8 0
3 years ago
Someone once observed that "the difference between roles and groups is that a user can shift into and out of roles, whereas that
mestny [16]

Answer:

All things considered newgrp has nothing to do with security jobs.  

newgrp sets the procedures bunch id which is in many frameworks are irrelevant. All gatherings are accessible. Gatherings are characterized as assortment of clients , bunch get to is conceded to documents dependent on the record gathering.  

Regularly (setgroups/getgroups ) all gatherings are in the process get to list.  

The authorization at a document or registry level has a 3 level arrangement of consents, for example, client proprietorship , bunch possession and others. All things considered the document authorization are a mix of read , compose and execute .we need both peruse and execute consent to run a program.  

A procedure may get to the document if a record has a place with the user(the proprietor of the document ) or if the gathering identifier coordinate on the gatherings in the clients bunches list. That entrance is constrained by the relating consents signals on the record.  

Gatherings have been over-burden with some "job" definitions. In any case, these are just over-burden and not a decent utilization of groups,the utilization of a gathering as a job was bolstered by the setgroup id banner , and by utilities like a sudo , where gathering name likewise coordinates a security control. It expect that the gathering name isn't utilized for documents yet once a client is in the gathering that client can apply the gathering to a record regardless of whether it isn't what the gathering was for.  

This over-burden use worked where frameworks didn't bolster genuine jobs. The over-burden utilize was only a work around.  

Linux has genuine job definition bolstered by SELinux models and can be applied to documents , clients , and forms.

7 0
4 years ago
// This pseudocode is intended to describe
tensa zangetsu [6.8K]

Applying information of a computational language in pseudocode, a code may be written to describe estimating the price of an item on sale for 10% off.

Writting the code:

<em>// This </em><em>pseudocode </em><em>is </em><em>intended </em><em>to desribe</em>

<em>// computing the price of an item on sale for 10% off</em>

<em>start</em>

<em>input origPrice</em>

<em>discount = price * 0.25</em>

<em>finalPrice = origPrice - discount</em>

<em>output finalPrice</em>

<em>stop</em>

<em />

<em>// This pseudocode is intended to </em><em>compute </em><em>the number</em>

<em>// of </em><em>miles per gallon </em><em>you get with your car.</em>

<em>start</em>

<em>input milesTraveled</em>

<em>input </em><em>gallonsOfGasUsed</em>

<em>milesPerGallon = milesTraveled / gallonsOfGasUsed</em>

<em>output milesPerGallon</em>

<em>stop</em>

<em />

<em>// This pseudocode is intended to compute the number</em>

<em>// computing the per dday </em><em>cost </em><em>of your rent</em>

<em>// in a 30-day month</em>

<em>start</em>

<em>input rent</em>

<em>costPerDay = rent / 30</em>

<em>output rent</em>

<em>stop</em>

Learn more about the pseudocode here :

brainly.com/question/13208346

#SPJ1

3 0
1 year ago
Other questions:
  • Maurice has just purchased his first computer, which contains a preinstalled suite of basic software applications. He receives a
    8·2 answers
  • 5. You just bought a new hard drive for your computer. You plan to use this as a secondary hard drive to store all your UMA file
    14·1 answer
  • What is TCP/IP?
    13·1 answer
  • URGENT!! You decide not to use any recipes or information from the "Don't Be an Animal Murderer" Web site. What characteristic o
    7·2 answers
  • What means can a worm use to access remote systems to propagate?
    7·1 answer
  • windows 10 brought back the desktop, and gives the option to use either the start screen or desktop with a new tiled___
    14·1 answer
  • The code segment below is intended to randomly print one of the values 2, 4, 6, or 8 with equal probability.
    12·1 answer
  • Design and implement a set of classes that define various types of electronics equipment (computers, cell phones, pagers, digita
    13·1 answer
  • Write the SQL query that would search a table called Movies and return the titles of movies that were made in 1975.
    7·1 answer
  • During which phase of system development would you acquire any necessary hardware and software?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!