1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
7

What is a wide-area network (WAN)?

Computers and Technology
2 answers:
Gre4nikov [31]3 years ago
8 0
<span>What is a wide-area network (WAN)?

</span><span>D. a set of computers and devices that are connected and communicate with each other over a large area </span>
goldfiish [28.3K]3 years ago
8 0

<u>D.) a set of computers and devices that are connected and communicate with each other over a large area </u>


You might be interested in
Find all three-digit numbers with non-zero first digit that are equal to the sum of the cubes of their digits.
Strike441 [17]

Answer:

Here is code in C++.

//include header

#include <bits/stdc++.h>

using namespace std;

// main function

int main() {

// check for all three digit numbers

for(int x=100;x<=999;x++){              

          int num = x;

          // find 1st,2nd and 3rd digit

          int d1 = x%10;                    

          int d2 = (x/10)%10;            

          int d3 = x/100;

          // calculate sum of cube of all three digits

          int sum=pow(d1, 3)+pow(d2, 3)+pow(d3,3);

          // if sum is equal to number then print it

         if(sum == num){

              cout<<num<<endl;

          }

}

return 0;

}

Explanation:

Check all the three digit numbers, if the sum of cubes of digits is equal to the number or not.First extract all three digit and then calculate their cubes. Then sum all those three value And then check if the sum is equal to the number or not.If the sum is equal to number then print the number.

Output:

153

370

371

407

3 0
3 years ago
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
Hunter-Best [27]

Answer:

Bayesian filtering

Explanation:

This is a type of filtering software that makes use of Bayesian logic to evaluate every incoming email that you receive, analyzing the header and content of the email to determinate if it is spam or not. It uses a preset of common words that are present in most spam emails, and it categorizes all received emails according to their probability to contain spam in trusted, or not trusted email. These categories are usually set by the user.

In short, Bayesian logic uses the knowledge acquired from past events to try to predict future events. Determinate the probability of success (from 0 to 100%) of a certain activity, according to the result of prior tests. It was first suggested in 1763 after the death of its creator Thomas Bayes, and it is widely spread across several different sciences such as programming, artificial intelligence, physics, etc.

6 0
4 years ago
When memory allocation is ____, it means all portions of the program and OS are loaded into sequential locations in memory.
OLga [1]

Answer:

Contiguous

Explanation:

A Contiguous memory allocation is known to be a classical memory allocation model. In this situation, we have a system which assigns consecutive memory blocks to a process. It is one of the oldest methods of memory allocation. If the process is in need of execution, the memory would be requested by the process. The processes size would then be compared to the amount of Contiguous memory that is available for the execution of the process.

3 0
3 years ago
A general rule for printing is to use _____ fonts for headlines and serif fonts for body text
il63 [147K]

Answer:

Times Roman

Explanation:

5 0
3 years ago
Can i add ADSence on bangla content in blogsopt website?
Inga [223]

Answer:

I do not think you can! However, I am not sure since I mainly use Wix!!!

Explanation:

8 0
3 years ago
Other questions:
  • List five types of system information that can be obtained from the windows task manager. how can you use this information to co
    5·1 answer
  • A friend has a CD of one of your favorite artists and has offered to let you copy it.
    8·1 answer
  • This is not a factor that you should use to determine the content of your presentation. Your audience your goals your purpose yo
    7·2 answers
  • Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They d
    5·1 answer
  • Sarah's employer purchased a health insurance plan that costs $750 per month. Sarah pays $75 toward the plan each month. What is
    5·2 answers
  • The local emergency manager has the responsibility for coordinating emergency management programs and activities. A local emerge
    7·1 answer
  • How to solve 3(x - 2) = 9x<br><img src="https://tex.z-dn.net/?f=3%28x%20-%202%29%20%3D%209x" id="TexFormula1" title="3(x - 2) =
    14·1 answer
  • Project 4: Strictly Identical arrays
    7·1 answer
  • Some of the ways we can resolve IPv4 address shortage
    15·1 answer
  • Step of opening browser on computer​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!