1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
12

What is a segment

Computers and Technology
1 answer:
monitta3 years ago
3 0
A length of uninterrupted cable connecting two devices
You might be interested in
4. Where do you find the command to create bibliography citations or a table of contents?
Mrac [35]

Answer:

the answer is quick access toolbar

4 0
3 years ago
Read 2 more answers
What is 4365 −3412 when these values represent
Inessa [10]

The result of the subtraction of 4365 and 3412 using octal numbers is of:

753.

<h3>What are octal numbers?</h3>

For octal numbers, each number is represented by three bits, as follows:

  • 0 = 000.
  • 1 = 001.
  • 2 = 010.
  • 3 = 011.
  • 4 = 100.
  • 5 = 101.
  • 6 = 110.
  • 7 = 111.

Then the binary representation of number 4365 is given as follows:

100011110101

The binary representation of number 3412 is given as follows:

011100001010

Then the following binary subtraction is made:

100011110101 - 011100001010

The result of this subtraction is of:

100011110101 - 011100001010 = 111101011

Then the octal result is given as follows:

111 101 011 = 753.

More can be learned about binary numbers at brainly.com/question/8649831

#SPJ1

4 0
1 year ago
Write a piece of code that constructs a jagged two-dimensional array of integers named jagged with five rows and an increasing n
Ksivusya [100]

Answer:

Explanation:

The following code is written in Java and it uses nested for loops to create the array elements and then the same for loops in order to print out the elements in a pyramid-like format as shown in the question. The output of the code can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       int jagged[][] = new int[5][];

       int element = 1;

       for(int i=0; i<5; i++){

           jagged[i] = new int[i+1]; // creating number of columns based on current value

           for(int x = 0; x < jagged[i].length; x++) {

               jagged[i][x] = element;

               element += 1;

           }

       }

       System.out.println("Jagged Array elements are: ");

       for ( int[] x : jagged) {

           for (int y : x) {

               System.out.print(y + " ");

           }

           System.out.println(' ');

       }

       }

   }

4 0
3 years ago
In the classic experimental design, there are two groups: the _____ group and the _____ group.
Tju [1.3M]

Main Answer:In the classic experimental design, there are two groups: the <u>treatment group and the control group.</u>

<u>Sub heading:</u>

<u>Explain treatment group and control group?</u>

Explanation:

1.The treatment group also known as the experimental group receives the treatment that the researcher is evaluating.

2.the control group  on the other hand does not receive the treatment.

Reference link:

https://brainly.com

Hashtag:

#SPJ4

5 0
1 year ago
Write five importanceof saving a file.​
olga nikolaevna [1]

Explanation:

number 1 it will be safe for future use number 2 it helps in our rest of the work

number 3 saving a file is a very good habit number for importance of saving file are a very very nice number 5 I hope it help please give me your ratings and like and also don't forget to read the brainly.com

8 0
2 years ago
Other questions:
  • Where are the instructions stored that the computer needs when it is switched on?
    7·1 answer
  • If there is a mistake with one of your bank accounts, who should you contact to resolve the issue
    14·1 answer
  • This is not based on homework but I have a question. I am currently using a gtx 960 with a 6 core amd processor. Does anyone kno
    6·1 answer
  • Assume there is a variable , h already associated with a positive integer value. Write the code necessary to count the number of
    13·1 answer
  • Which person would be the best fit for a career in the Information Technology field?
    14·2 answers
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • Which attribute defines the file name for the specific image in an image tag??
    13·1 answer
  • The table button is present in the ……… tab.​
    14·2 answers
  • Which of these is an example of a system?
    7·1 answer
  • Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!