1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
5

If a pedestrian begins to cross my path when i have the right of way

Computers and Technology
1 answer:
Daniel [21]3 years ago
3 0
What exactly is your question?? If you are driving all pedestrians have the right way.....treat all intersections as a crosswalk painted or not!!!
You might be interested in
What are the advantages and disadvantages of UTF-8 compared to ASCII?
Romashka [77]

Answer:

UTF-8 and ASCII both are the character encoding.

In a system,every character has some binary representation,these are the method to encode them.Earlier only ASCII was there, for every character it uses 8 bits to represent.In ASCII only 8 bytes were there i.e 2^8 that is 256.We can't represent number beyond than 127 so it generate a need for other encoding to get into,these drawbacks lead to Unicode,UTF-8.

As ASCII codes only uses a single byte,UTF-8 uses upto 6 bytes to represent the characters.So we can save characters which are as long as 2^48 characters. We can read this encoding easily by the help of shift operators and it is also independent of byte order.

As messages on internet were transferred over 7 bit ASCII messages,so many mail servers removed this encoding.    

6 0
2 years ago
Write down a description of how a magnetic had drive works
Rus_ich [418]

Answer:

This is how a magnetic hard drive works

Explanation:

The hard drive contains a spinning platter with a thin magnetic coating. A "head" moves over the platter, writing 0's and 1's as tiny areas of magnetic North or South on the platter. To read the data back, the head goes to the same spot, notices the North and South spots flying by, and so deduces the stored 0's and 1's.

Hope it helps pls mark as brainliest

5 0
3 years ago
Write a program sum.cpp that reads a sequence of integers from cin, and reports their sum. Example If you have a file numbers.tx
Katarina [22]

Answer:

The solution code is as follows:

  1. #include <iostream>
  2. #include <fstream>
  3. #include <string>
  4. using namespace std;
  5. int main()
  6. {
  7.    ifstream data;
  8.    float number;
  9.    float sum = 0;
  10.    
  11.    data.open("numbers.txt");
  12.    
  13.    while (data >> number) {
  14.        sum = sum + number;
  15.    }
  16.    cout<<sum;
  17.    return 0;
  18. }

Explanation:

Firstly, we create a ifstream object, <em>data</em> (Line 9). Then we can use the ifstream object to open the "numbers.txt" (Line 13) and use while loop to traverse through the number in the text file line by line (Line 15). White the loop is ongoing the number in each line is read by >> operator in a similar way to cin and then add each read number to sum variable (Line 16).

At last, display the output (Line 18).

8 0
3 years ago
What are the different types of Network Connectivity Devices?
mylen [45]

Explanation:

Types of network devices

Hub.

Switch.

Router.

Bridge.

Gateway.

Modem.

Repeater.

Access Point.

HOPE THIS HELPS YOU THANK YOU.

3 0
2 years ago
you are using linux and need to perform a reverse lookup of the ip address 10.0.0.3. which command would you use to accomplish t
ollegr [7]

A command you would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system: dig -x 10.0.0.3.

<h3>What is a Linux command?</h3>

A Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator (end user) of a Linux network perform both basic and advanced tasks by only entering a line of text.

<h3>What is IP address?</h3>

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

In Computer Networking, a command which an administrator (end user) would use to perform a reverse lookup of the IP address 10.0.0.3 on a Linux system is dig -x 10.0.0.3.

Read more on Linux commands here: brainly.com/question/25480553

#SPJ1

3 0
1 year ago
Other questions:
  • Which piece of code results in the following? Italics
    15·1 answer
  • Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
    6·1 answer
  • Late at night, some traffic signals change patterns and become _____.
    9·2 answers
  • Read the scenario below, and then answer the question.
    13·1 answer
  • Does anyone have 2.19.4 Guess a number 2.0 code for codehs?
    8·1 answer
  • Defination of formula bar​
    14·1 answer
  • PLEASE HELP! WILL MARK AS BRAINLIEST!
    6·2 answers
  • Please help!
    9·1 answer
  • 1.Which of the serves as the basis for determining whether an object has moved or not?
    10·1 answer
  • Which is a major drawback of muliuser procesing of a database
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!