1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena-2011 [213]
3 years ago
14

The pc card and cardbus devices are being replaced by what technology?

Computers and Technology
1 answer:
Ronch [10]3 years ago
3 0
They are replaced by ExpressCard

You might be interested in
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
Serhud [2]

Answer:

DiffServ (Differentiated Service)

Explanation:

DiffServ (Differentiated Service) field is used to prioritize traffic in IPv4 packet.

DiffServ is used as QoS (quality of service) on networks at Layer 3, replacing former IPv4 TOS field to effectively deal with the web traffic and prioritization issues starting from 1998.

3 0
3 years ago
Write a set of nested loops that display 10 rows of # characters. There should be 15 # characters in each row.
Andrews [41]

Answer:

Following are the code to this question:

public class M//defining class M

{

public static void main(String[] as)//defining main method

{

    int i,j;//defining integer variable

for (i= 1; i <=10; i++)//defining for loop for print column    

{

for (j = 1; j<=15; j++)//defining for loop for print rows

{

System.out.print("#");//print # value

}

System.out.println();//print space

}

}

}

Output:

###############

###############

###############

###############

###############

###############

###############

###############

###############

###############

Explanation:

The code defines a class "M" and the main method is defined within a class and two integer variables I and j" are defined within the primary procedure, while the next step defines two for a loop.  

In the first loop, the column value is printed, and a further loop that prints the row value is declared inside the loop.  

5 0
3 years ago
Suzy lives alone in New York, whereas her family lives in Florida. It is difficult for Suzy to visit her family very frequently,
Luda [366]
Answer:

<span>Skype.

---> Skype can most probably help Suzy given that the application allows for people to message, talk and video chat. This means that Suzy can see her family through video call, and see their face.

Best of wishes! xx :)</span>
4 0
3 years ago
Read 2 more answers
Mrs. Zoo gave out the rubric for our essay. She stated that our essay should be complete by Friday of that week. I didn't have t
Rom4ik [11]

Answer:

No

Explanation:

You had the whole week for the essay but didn't do it and then turned it in late.

6 0
3 years ago
Q Basic program write a program in Q Basic to find the cost of 10 pens when the cost of 15 pens is 75 use unitary method to find
Ne4ueva [31]

give the function of cpu

5 0
3 years ago
Other questions:
  • You work in a customer call center. Martin is on the phone asking about the difference between solid-state drives (SSDs), hybrid
    6·1 answer
  • If the physical memory size is doubled without changing any of its other parameters, the number of entries in the page table
    5·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • A byte contains how many bits? Question 3 options:
    13·2 answers
  • Janet received an email from a bank asking for the password for her Internet banking account. She emailed back her password. A f
    12·2 answers
  • Which of the following situations would not require knowledge of networking?
    11·2 answers
  • Describe a cellular network, its principle<br> components and how it works.
    7·1 answer
  • IPv4 and IPv6 are addresses used to identify computers on the Internet. Is this whether true or not:
    5·1 answer
  • How do i know my child's login info for parent infinite campus
    14·1 answer
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!