1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
4 years ago
5

Is a trade group that promotes wireless technology and owns the trademark for the term “wi-fi”

Computers and Technology
2 answers:
ivann1987 [24]4 years ago
7 0

Answer:

1. Wifi Alliance

2. Cells

Hope this helps! Have a great day! :)

Vikki [24]4 years ago
5 0

Answer:

the next answers are

roaming

bluetooth

PDA

smartphone

laptop computer

it is connected by a physical wire

short-range

smartphone

mobile

car phones

practically anywhere

bluetooth headset

tablet computer

-what are a few precautions, check all that apply...

1,2,4

- IT professionals have a responsibility...

1,2,3

Explanation:

did the assignment. good luck :)

You might be interested in
An application ________ is anyone who writes a computer application for one or more platforms.
yarga [219]

Answer:

An Application Programmer

Explanation:

A Programmer is a professional who writes applications for the computer on a platform.

8 0
3 years ago
Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
Margaret [11]

Explanation:

A.)

we have two machines M1 and M2

cpi stands for clocks per instruction.

to get cpi for machine 1:

= we multiply frequencies with their corresponding M1 cycles and add everything up

50/100 x 1 = 0.5

20/100 x 2 = 0.4

30/100 x 3 = 0.9

CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8

We find CPI for machine 2

we use the same formula we used for 1 above

50/100 x 2 = 1

20/100 x 3 = 0.6

30/100 x 4 = 1.2

CPI for m2 =  1 + 0.6 + 1.2 = 2.8

B.)

CPU execution time for m1 and m2

this is calculated by using the formula;

I * CPI/clock cycle time

execution time for A:

= I * 1.8/60X10⁶

= I x 30 nsec

execution time b:

I x 2.8/80x10⁶

= I x 35 nsec

6 0
3 years ago
Which mechanisms do we use to transport binary data and memory addresses?
Sav [38]

Answer:

The External Data Bus  is used to transport binary data and Address bus is used to transport memory addresses.

Explanation:

  • External Data Bus is a combination of data bus and external bus. Data bus is used to carry data and instructions between two or more components in the system e.g. CPU and all other computer components.
  • External bus is also called expansion bus. It is used to connect external components to the computer. Its a communication medium between CPU and other components. These components can be peripheral device like USB or flash memory.
  • So External Data Bus is used to transport data between CPU and external components. It is a primary communication pathway for data in a computer. The external data components are connected to this bus and the instruction or data on this bus is available to all external components. But the data communication is slower as compared to that of internal bus.
  • Address Bus carries physical location or address of data and transports memory addresses. Processor uses address bus when it wants to read data from memory or write data to the memory by sending a read/write signal by placing the read/write address of the specific memory location on the address bus.

 

6 0
4 years ago
You have a number of Cisco routers and switches that you wish to secure using IPsec. You want IPsec authentication to use digita
aev [14]

Answer:

NDES role service

Explanation:

NDES provides and manages certificates used to authenticate traffic and implement secure network communication with devices that might not otherwise possess valid domain credentials.

3 0
3 years ago
Trent is researching what it would take to become a pharmaceutical scientist. What academic requirements should he complete?
Llana [10]

Answer:

D - a doctorate degree

Explanation:

You are studying in a role as a doctors position.

8 0
2 years ago
Other questions:
  • Write a program that asks for a password and then verifies that it meets the stated criteria. • If the password meets the criter
    13·1 answer
  • _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a we
    9·1 answer
  • You review a design written by somebody else for an application and you find these: - an interface Shape with a method draw() -
    7·1 answer
  • a conpany manufacturers computer screens that utilize less electricity. which form of technology would this be classified as​
    5·1 answer
  • In order to manage information for a company, your website would need a/an
    6·1 answer
  • What did Adam and Eve look like?
    7·2 answers
  • Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters.
    15·1 answer
  • Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
    12·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    9·1 answer
  • What is the full form of SAARC<br><br>And free point!! ​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!