1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
3 years ago
15

Emma has decided that she needs to assess the risk and return of buying an extended warranty for her new laptop for school

Computers and Technology
1 answer:
vazorg [7]3 years ago
4 0

Answer:

then she should buy the one that can last long cause if she buy the one that is bad that could also be assets the risks to buying an extended warrantly for her new laptop for school

You might be interested in
Create a plot of monthly averaged max and min temperature (columns TMAX and TMIN). That is each January in the record will be in
sertanlavr [38]

Answer:

robuk plssss

Explanation:

5 plss just 5 1=2

3 0
3 years ago
What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
Deffense [45]
<span>The purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command is that </span>It allows many inside hosts to share one or a few inside global addresses. 
8 0
3 years ago
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
3 years ago
A credit card company receives numerous phone calls throughout the day from customers reporting fraud and billing disputes. Most
Veronika [31]

Answer:

3.59 minutes

Explanation:

We solve this question using z score formula

Using Excel

Z-SCORE= (DataPoint-AVERAGE(DataSet))/STDEV(DataSet)

IN EXCEL,

AVERAGE, an excel function that calculates the Average of data set

STDEV.S: calculates the standard deviation while treating the data as a ‘sample’ of a population.

STDEV.P: This function calculates the standard deviation while treating the data as the entire population.

Z score formula = x - μ/σ

x = ?? μ = 2.5 minutes σ = 0.5 minutes

We are asked : If 1.5% of the callers are put on hold for longer than x minutes, what is the value of x?

Hence, Longer than = Greater than =

100 - 1.5%

= 100 - 0.015

= 0.985 ( 98.5%)

Using Excel we calculate = z score for 98.5 percentile

= 2.1701

Z score = x - μ/σ

2.1701 = x - 2.5/0.5

2.1701 × 0.5 = x - 2.5

1.08505 = x - 2.5

x = 1.08505 + 2.5

x = 3.58505

Approximately to 2 decimal places = 3.59 minutes

Therefore, 1.5% of the callers are put on hold for longer than 3.59 minutes.

8 0
3 years ago
How do you make the "Colorize" feature in GIMP consistent if you cannot connect the different places? Brainliest if you also exp
Brums [2.3K]

Ah, that's easy. You have to select certain parts by using the Free Select tool. Use colorize. Then select the next part and use colorize, but choose the latest used PRESET color to be consistent.

To cut out parts of the image, duplicate your layer without colorization and colorize the top layer. If you have already colorized, put the duplicate as the top layer and click Base Image on the edit history for your original, which is the bottom layer. Use Free Select then click Scissor Select and press the delete button on your keyboard to remove an area, then switch from top layer to bottom layer and use colorize.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following allows you to view and access important information about your document all in one location?
    14·1 answer
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
    9·2 answers
  • Select the guidelines you should follow when creating a resume
    12·2 answers
  • ___________ is a task pane used to correct grammar errors; opens when you click the Spelling &amp; Grammar button in the Proofin
    15·2 answers
  • What is a bin range?
    14·1 answer
  • Compute the average of a list of user-entered integers representing rolls of two dice. The list ends when 0 is entered. Integers
    12·1 answer
  • What starts with p and ends with orn
    15·2 answers
  • How many binary digits are in 10^100.
    13·1 answer
  • If you are inviting more than one person to a meeting, you can use a(n) _____ to separate the email addresses.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!