1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
12

Help , i couldn’t find this answer

Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
4 0

Answer:

Internet Explorer

Explanation:

You might be interested in
What is a type of machine-to-human communication?
Sonbull [250]

A. Biofeedback

Its where your body is read by a machine and you read the machine

3 0
3 years ago
Read 2 more answers
g 1-1 Which network model layer provides information about the physical dimensions of a network connector like an RJ45
Harlamova29_29 [7]

Answer:

Physical layer

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

In the OSI model, the physical layer is the first and lowest layer. Just like its name physical, it addresses and provides information about the physical characteristics such as type of connector, cable type, length of cable, etc., of a network.

This ultimately implies that, the physical layer of the network (OSI) model layer provides information about the physical dimensions of a network connector such as a RJ45. A RJ45 is used for connecting a CAT-5 or CAT-6 cable to a networking device.

8 0
3 years ago
The Save command is located
tatiyna

Answer:

the save command is located in the file menu

4 0
3 years ago
NO LINKS<br> Do you need to pay monthly to stream on Twitch?
telo118 [61]
I think so yeah $$$$
3 0
3 years ago
Write a demo main program that illustrates the work of BigInt(n) and prints the following sequence of big numbers 1, 12, 123, 12
Soloha48 [4]

Answer:

The solution code is written in C++

  1. void BigInt(int n){
  2.    
  3.    int i, j;
  4.    
  5.    for(i = 1; i <= n; i++){
  6.  
  7.        for(j = 1; j <= i; j++){
  8.            
  9.            if(j < 10){
  10.                
  11.              cout<<j;                
  12.            }
  13.            else{
  14.              cout<<0;
  15.            }
  16.          
  17.        }
  18.        
  19.        cout<<"\n";
  20.        
  21.    }
  22. }
  23. int main()
  24. {
  25.    BigInt(10);
  26.    
  27.    return 0;
  28. }

Explanation:

Firstly, create a function BigInt that takes one input number, n.

Next, create a double layer for-loop (Line 5-21). The outer loop is to print one big number per iteration and the inner layer is keep printing the accumulated individual digit for a big number. To ensure the big number is printed one below the other, we print a new line in outer loop (Line 19).

In main program, we call the function to print the big number (Line 26).

4 0
3 years ago
Other questions:
  • What is a drawback to being in Slide Show mode? a- Being able to review each slide in order
    8·2 answers
  • Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
    7·1 answer
  • Which one cost more Broken bones or a Broken Computer? Explian ur answer
    12·2 answers
  • A server needs to connect directly to the Internet. The ipconfig/all command shows that the server has been auto-assigned the IP
    5·1 answer
  • Crossing out answers that could not possibly be correct is called ‘eliminating answers.’ Please select the best answer from the
    13·2 answers
  • Select the properties of the sn1 reaction mechanism.
    9·1 answer
  • Put the following five steps in the order in which you would perform them to use the Paste Special function. 1. Select and copy
    6·1 answer
  • If the firewall is configured for credential phishing prevention using the "Domain Credential Filter" method, which login will b
    10·1 answer
  • What is the best response to cyberbullying?
    10·2 answers
  • Who can give me answer for this kinda urgent pls
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!