1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kati45 [8]
3 years ago
7

Which label belongs in the area marked Z? Producers Science Question

Computers and Technology
2 answers:
galina1969 [7]3 years ago
8 0

not enough info but i think it might be b

Bad White [126]3 years ago
5 0
Idk dont  ask me i thank its c
You might be interested in
Suppose users share a 1 Mbps link. Also suppose each user
torisob [31]

Answer:

The answer is below

Explanation:

A) The total bandwidth = 1 Mbps = 1000 Kbps

The requirement for each user = 100 Kbps

Total number of users = Total bandwidth /  requirement for each user

Total number of users = 1000 Kbps / 100 Kbps = 10 users

B) Since each user transmits only 10 percent  of the time, probability that a given user is transmitting is:

Probability = 0.1

C) Binomial distribution formula is given by:

P(x)= C(n,x)p^x(1-p)^{n-x}\\\\n = number\ of \ trials,x=number\ of\ success, p=probability\ of\ success \ for\ one\ trialHence:

Probability=(50\ choose\ n)p^n(1-p)^{50-n}

P=C(50,n)p^n(1-p)^{50-n}

D) The probability that there are 11 or more is:

Probability=1-\Sigma\limits^{20}_0 {(50\ choose\ n)p^n(1-p)^{50-n}}

4 0
3 years ago
А.<br> is the highest education degree available at a community college.
s344n2d4d5 [400]

Answer:

The answer is "associate".

Explanation:

The two-year post-school degree is also known as the associate degree, in which the students pursuing any of this degree, which may take as little as 2 years to complete the course, although many prefer to do it at the same rate. Its first two years of a Bachelor (fresh and sophomore years) were covered by an Associate degree.

8 0
3 years ago
How much do taxis coast?
Novay_Z [31]
It depends on how far you travel

3 0
3 years ago
Read 2 more answers
What are the 4-bit patterns used to represent each of the characters in the string "1301"? Only represent the characters between
Alla [95]

Explanation:

The string "1301" can be converted into numbers by using the ASCII characters set.

1. Decimal ASCII

1=49, 3=51, 0=48, 1=49

Without space

"1301" = 49 51 48 49

with space included

"1 3 0 1" = 49 32 51 32 48 32 49

(white space is represented by 32 in Decimal ASCII)

2. Hexadecimal ASCII

1=31, 3=33, 0=30, 1=31

Without space

"1301" = 31 33 30 31

with space included

"1 3 0 1"= 31 20 33 20 30 20 31

(white space is represented by 20 in hexadecimal ASCII)

The magnitude can be found by traditional decimal to binary conversion (Divide by 2 until we are left with remainder 0 or 1) and sign can be represented by adding most significant bit (MSB) 0 for positive and 1 for negative.

A. -27

Magnitude: 00011011

Since the sign is negative add 1 to the MSB

which becomes 100011011

B. 140

Magnitude: 10001100

Since the sign is positive add 0 to the MSB

which becomes 010001100

C. -99

Magnitude: 01100011

Since the sign is negative add 1 to the MSB

which becomes 101100011

D. 46

Magnitude: 00101110

Since the sign is positive add 0 to the MSB

which becomes 000101110

7 0
3 years ago
Add me as a friend on Real pool 3D so we can play a round of pool!!!
Sloan [31]

I will but i have to wait till after 3;00 will you still be online by then. If not you can just friend me and message me when you are today

8 0
3 years ago
Other questions:
  • Write a script that will generate random integers in the range from
    10·1 answer
  • While at work, Joe asked Dana to show him how to change the copier paper. Joe kept working as she explained the process, and the
    5·2 answers
  • Select the correct answer.
    15·1 answer
  • The US government takes the protection of patients' private information very seriously. In 1996, went into effect. This law prot
    14·1 answer
  • Luchen Modo, a software development firm in Asia, launched a new software for smartphones that allowed users to remotely control
    11·1 answer
  • you are configuring a firewall to all access to a server hosted in the demilitarized zone of your network. You open IP ports 80,
    7·1 answer
  • Please write a complete program to calculate monthly payment given
    15·1 answer
  • What function key is used to enable the spelling and grammar function
    14·1 answer
  • (50 POINTS!) Type the correct answer in the box.
    11·1 answer
  • Consider the following method:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!