1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
3 years ago
9

6. Sandra did a survey to see how

Computers and Technology
1 answer:
OLEGan [10]3 years ago
6 0

Answer:

B. 312

Explanation:

Logically someone will not keep dog & cat togther. So if sandra was ask 1800 students she ill got 1800÷150=12 times are 26 students said they owned a dog. So 12×26 = 312 students are owned a dog & will not own a cat.

You might be interested in
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
-BARSIC- [3]

Answer:

b. Same SSID, different channel

Explanation:

The Service Set Identifier (SSID) is a sequence that is included in all of the sets in a wirless network and helps identify them as part of the network. Because both points connec to the same network they need the same SSID.

7 0
3 years ago
5.2
Ray Of Light [21]

Answer:

In order to reduce the risk of accidents on the roads.

Explanation:

The special equipment is used when  testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.

8 0
2 years ago
) Consider a router that interconnects four subnets: Subnet 1, Subnet 2, Subnet 3 and Subnet 4. Suppose all of the interfaces in
erik [133]

Answer:

Check the explanation

Explanation:

223.1.17/24 indicates that out of 32-bits of IP address 24 bits have been assigned as subnet part and 8 bits for host id.

The binary representation of 223.1.17 is 11011111 00000001 00010001 00000000

Given that, subnet 1 has 63 interfaces. To represent 63 interfaces, we need 6 bits (64 = 26)

So its addresses can be from 223.1.17.0/26 to 223.1.17.62/26

Subnet 2 has 95 interfaces. 95 interfaces can be accommodated using 7 bits up to 127 host addresses can represented using 7 bits (127 = 27)

and hence, the addresses may be from 223.1.17.63/25 to 223.1.17.157/25

Subnet 3 has 16 interfaces. 4 bits are needed for 16 interfaces (16 = 24)

So the network addresses may range from 223.1.17.158/28 to 223.1.17.173/28

4 0
3 years ago
(TCOE) When a customer purchases software that displays a clickwrap agreement at the time of installation, the consumer has alre
GaryK [48]

Answer:

The analysis is presented throughout the section described, as per the given situation.

Explanation:

  • Those requirements as well as agreements do not apply to something like the acquisition of the commodity. But perhaps the terms and agreements are all about the use of the name. This means that for illegal or immoral procedures, when and how to use the item and even the component shouldn't be used.
  • The overall profitability certainly comes with either the commodity themselves as well as during implementation, trying to give one's authorization has always been about the service mostly with the supplier.

However, during implementation, the contract is something different from the place where you live throughout your purchase.

7 0
2 years ago
Which of the following identifies a user based on anatomical characteristics such as a fingerprint, a voice print, or iris patte
antiseptic1488 [7]

Answer:

Biometrics

Explanation:

Biometrics is the techniques that is used to measure and identify different characteristic of human being that are usually unique in nature for individuals such as voice characteristics, eye retina and finger prints. These features are unique for every person. These features could be used for different purposes now a day such biometric identification, biometric verification and for forensic purposes.

There are different algorithms to compute and compare these unique characteristics for each user and store in a database for the purpose of identification of the users. This data can also be used for forensic purpose if needed by some security agency to identify some person.

The type of identification in which these features such as voice, finger prints and iris pattern use is called biometrics.

3 0
3 years ago
Other questions:
  • 1. If you purchase the renters insurance policy described above, you bring a suitcase of clothing and other general
    12·1 answer
  • Which action will help you protect data in your computer in case of an earthquake?
    7·2 answers
  • The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
    8·1 answer
  • which statement draws an accurate comparison between social media marketing and conventional marketing?
    13·1 answer
  • Define an organizational unit in your own words.
    11·1 answer
  • Whats important about the points?
    10·2 answers
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • Your principal has hired you to design a drone that can monitor students in the hallways. Before you brainstorm design ideas, yo
    15·2 answers
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
  • you manage a network that has multiple internal subnets. you connect a workstation to the 192.168.1.0/24 subnet. this workstatio
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!