1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
14

What does it mean to "Resist being manipulated by staged photo opportunities"?

Computers and Technology
1 answer:
Vesna [10]3 years ago
3 0
Do not arrange photos for effect. 
You might be interested in
You've formatted the first paragraph of a document. What button can you use to apply the formatting from the first paragraph to
Nata [24]
I think the answer is B. format painter 

3 0
3 years ago
Recall that with the CSMA/CD protocol, the adapter waits K. 512 bit times after a collision, where K is drawn randomly. a. For f
julia-pushkina [17]

Complete Question:

Recall that with the CSMA/CD protocol, the adapter waits K. 512 bit times after a collision, where K is drawn randomly. a. For first collision, if K=100, how long does the adapter wait until sensing the channel again for a 1 Mbps broadcast channel? For a 10 Mbps broadcast channel?

Answer:

a) 51.2 msec.  b) 5.12 msec

Explanation:

If K=100, the time that the adapter must wait until sensing a channel after detecting a first collision, is given by the following expression:

  • Tw = K*512* bit time

The bit time, is just the inverse of the channel bandwidh, expressed in bits per second, so for the two instances posed by the question, we have:

a) BW  = 1 Mbps = 10⁶ bps

⇒ Tw = 100*512*(1/10⁶) bps = 51.2*10⁻³ sec. = 51.2 msec

b) BW = 10 Mbps = 10⁷ bps

⇒ Tw = 100*512*(1/10⁷) bps = 5.12*10⁻³ sec. = 5.12 msec

5 0
3 years ago
Which activity is a case of identity theft
dezoksy [38]
<span>Criminal identity theft (posing as another person when apprehended for a crime)Financial identity theft (using another's identity to obtain credit, goods and services)Identity cloning (using another's information to assume his or her identity in daily life)Medical identity theft (using another's identity to obtain medical care or drugs)<span>Child identity theft]


cite: wikipedia</span></span>
4 0
3 years ago
Read 2 more answers
An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours, plus any overtime pay. Ov
LuckyWell [14K]

Answer:

Assuming this is Python, I would do something like the following:

Explanation:

hourWage= float(input ("What is your hourly wage?: "))

regularHours= float(input ("How many regular hours did you work this week?: "))

overtimeHours= float(input ("How many overtime hours did you have this week?: "))

overtimeWage= (1.5*hourWage)

totalWeeklyPay= (hourWage*regularHours)+(overtimeHours*overtimeWage)

print= ("Your total weekly pay is: " ,totalWeeklyPay)

I hope this works!

8 0
3 years ago
How has the used of computers and advances in technology changed the healthcare industry
mestny [16]
In many, many ways. Here's some things you can talk about:

•Previously we stored patient data by hand on paper. Now we use computers to store it. This is better because what if we accidentally lost/destroyed the papers or it burned down? With computers this risk is minimised.

•We can now diagnose patients with problems with much more precision thanks to advances like MRI scanning, CT scans, and X-rays. This means we can pinpoint problems rather than guess what’s wrong.

•Prescriptions for medicine can now be arranged online and delivered to your door in some areas, whereas previously you would have to walk in and get the medicine which could be time consuming.

•We now have phones to dial 911 for emergency ambulance services. This has revolutionised how quickly responders can respond to life threatening events.

There’s much more to talk about, but all of the points above are a sold start.
4 0
3 years ago
Other questions:
  • To display the control panel window, first right-click ____ and then click control panel.
    5·1 answer
  • The operations planning practice of inputting sales forecasts into computer software that accurately predicts the amount and tim
    6·1 answer
  • Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
    7·1 answer
  • An expression involving byte, int, and literal numbers is promoted to which of these?
    12·1 answer
  • Given a Student class, create a class with following characteristics:
    6·1 answer
  • Which types of computers are used by large businesses
    10·1 answer
  • Johnathan was assigned to complete a project with three other people. What benefit will he get from working with the team?
    15·1 answer
  • Match the context details with the pattern that applies.
    7·1 answer
  • The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi
    14·1 answer
  • What’s Discord Packing?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!