1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
3 years ago
13

I have an android tablet, when I charged it, it was at 23%. I put away my charger and just started playing. My percent didn't go

down after like 30 minutes. So it was charging but the percent didn't go up. How do I fix this? I don't have my tablet with my right now so I won't be able to do anything right now.
Computers and Technology
1 answer:
Irina-Kira [14]3 years ago
6 0
Try resetting the tablet and see what happens. If that doesn't work you can hard reset it (This will remove everything on your device and make it look brand new)
You might be interested in
What is the processing speed for the second generation of computers​
Helga [31]

10mbp

I hope it helps you

5 0
3 years ago
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
Suppose you will invest $100 per month at the beginning of the month for 40 years with interest rate
Alexeev081 [22]

Answer:

future value = 232369.1361

return % = 384.10 %

Explanation:

given data

principal = $100 per month

time = 40 year = 480 months

rate = 6.25 % yearly = 0.0625 yearly = 0.005208 monthly

to find out

total amount of capital at the end of your investment and percentage is  your total return

solution

so here future value formula is

future value = P \frac{(1+r)^{t-1}}{r} * (1+r)   ..........1

here r is rate and t is time and P is principal

so put all value

future value = 100 \frac{(1+0.005208)^{480-1}}{0.005208} * (1+0.005208)

future value = 232369.1361

so

Total capital at the end of investment-Total principle invested over the years

232369.1361 - 100 ( 12 × 40 )

184369.1361

so

Return % = \frac{184369.1361}{48000} × 100

return % = 384.10 %

5 0
3 years ago
Why are people's visions of utopias and dystopias subjective?
Leno4ka [110]

Answer:

D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.

Explanation:

3 0
3 years ago
A T-1 system multiplexes ___ into each frame
zimovet [89]

Answer:

PCM encoded samples from 24 voice band channels

Explanation:

The Multiplexer from a lot of inputs generates one single output. And it is the select line that determines which of the input is going to influence output. And the select lines determine the increase in the quantity of data that can be sent through the network in a given amount of time. And this is termed as a data selector. Please note, this is application of multiplexer in data transmission.

And now coming to the T1 carrier system, it is a time division multiplexor, which multiplexes the PCM encoded samples coming from 24 band channels that require to be transmitted over an optical fiber or single metallic wire pair. And for this question, we need what is being multiplexed, and that is as mentioned in the Answer section.

4 0
3 years ago
Other questions:
  • Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
    13·1 answer
  • Define a function below called increase_elements_by_x, which takes two arguments - a list of numbers and a single positive numbe
    13·1 answer
  • (true/false) In a layered operating system design, requests (such user processes may need to interact with multiple layers, resu
    14·1 answer
  • Once the term of copyright has expired,a work
    15·1 answer
  • To distribute one or more presentations for use on another computer, which of the following features should you use?
    13·1 answer
  • Grid computing takes advantage of the available 75% of unused processing power of a computer and links thousands of individual c
    13·1 answer
  • You wrote a program to allow to guess a number chosen randomly.
    10·2 answers
  • Anyone play Ro-blox ? without the -
    7·2 answers
  • Need help completing this coding assignment.
    11·1 answer
  • Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Iev
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!