1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
4 years ago
15

Why do astronomers prefer to use the reflecting telescope rather than the refracting telescope to view distant objects in space?

Computers and Technology
2 answers:
sdas [7]4 years ago
7 0
C is the right answer
dybincka [34]4 years ago
4 0

Answer:

a reflecting telescope does not absorb the harmful radiations in the electromagnetic spectrum

Explanation:

hopes this helps

You might be interested in
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that
andrey2020 [161]

Answer:

It is the user tier of the 3-tier architecture that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

Explanation:

Almost if not all applications that use e-commerce for operations use the 3-tier architecture.  3-tier architecture is simply the arrangement of server tier which consists of all computers that run a web server and a database tier that consists of computers that run a DBMS to store and retrieve data. We also have the user data that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

When you make a request, for instance to Google in your local browser, the browser sends a request to the internet. This initial interaction between the user and the internet is what is known as the user tier of the 3 tier architecture. Basically, it is the phase where end users access content online through graphical interface browsers and make requests to the web servers and DBMS.

Learn more about 3-tier architecture

brainly.com/question/12627823

#LearnWithBrainly

6 0
3 years ago
. Explain how semaphores are handled in embedded systems design
Readme [11.4K]

Answer:

 Semaphores carries the signal between the task and interrupts that does not carry any type of additional data in the embedded system. A semaphore is used as synchronization object and helps in maintain the value between zero and the specific higher value.  

It basically reduced the value each time and complete the semaphore object in the embedded system. Binary semaphores is the main type of semaphore that invoke activation of the task.

 

5 0
3 years ago
What is a core in computer
Evgesh-ka [11]
<span>Hey there, this isn't really my part of town, I'm what you call a math freak, but here.

In relation to computer processors, a core is the processing kinda like a brain we ppl have, this is the unit that receives instructions and performs calculations, or actions, based on those instructions like when you click something. A set of instructions can allow a software program perform a specific function. Processors can have a single core or multiple cores that do many different things.
Hopefully i helped you, please mark brainly if possible.</span><span />
4 0
3 years ago
Read 2 more answers
You are opening a store, and having a working website is an important part of your project plan. The company that started creati
masya89 [10]

Answer:

I think it might be Budget and time. :)

5 0
3 years ago
Assume your computer clock runs at the speed of 2.5 GHz (G=10^9).
azamat

Answer:

a) T=4*10^{-4}μs

b) N=2.5*10^6 cycles

c) 10000 programs.

Explanation:

a) We know that the frequency is the inverse of the period, so:

f=\frac{1}{T}\\\\T=\frac{1}{f}\\T=4*10^{-10}s

1μs is equal to 1*10^{-6}s

so T=4*10^{-4}us

b) If in a second there are 2.5*10^9 cycles:

N=2.5*10^9*(1*10^{-3})=2.5*10^6 cycles

c) we have to make a conversion, we know that a program takes 100*10^(-3) milliseconds, that is, 1*10^(-4) seconds so in 1 second we can execute:

P=\frac{1s}{1*10^{-4}s}=10000

10000 programs.

7 0
3 years ago
Other questions:
  • Electronic ledger that tracks mathematical data
    15·1 answer
  • 7.
    6·1 answer
  • write a c++ program that reads from the user a positive integer (in a decimal representation), and prints its binary (base 2) re
    8·1 answer
  • Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
    7·1 answer
  • You just came back to your office from a meeting about is security.​ you've learned a few things about a​ "good" password, and y
    15·1 answer
  • A function operates on this, which may consist of a constant, a cell reference, or another function.
    7·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and cond
    9·1 answer
  • Which is a basic job requirement for a career in corrections services?
    13·1 answer
  • Write a program great_circle.python that takes four float arguments x1 y1 x2 y2
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!