1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
10

How do you make your technology device quicker

Computers and Technology
1 answer:
Westkost [7]3 years ago
7 0
Get a better processor? What do you want to get faster is it everythibg or is there a specific part?
You might be interested in
Two stations running TCP/IP are engaged in transferring a file. This file is 1000MB long, the payload size is 100 bytes, and the
weeeeeb [17]

Answer:

a. 2100

b. 2199

Explanation:

GIven that:

The file size = 1000 MB

The  payload size is  = 100 bytes

The negotiated window size is = 1000 bytes.

This implies that the sliding window can accommodate maximum number of 10 packets

The sender receives an ACK 1200 from the receiver.

Total byte of the file is :

1000 MB = 1024000000 bytes

a.

Sender receives an ACK 1200 from the receiver but still two packets are still unacknowledged

=1200 + 9 * 100

= 1200 +  900

= 2100

b. What is the last byte number that can be sent without an ACK being sent by the receiver?

b. Usually byte number starts from zero, in the first packet, the last byte will be 99 because it is in 1000th place.

Thus; the last byte number send is :

= 1200 + 10 *100 -1

= 1200 + 1000-1

= 1200 + 999

= 2199

6 0
4 years ago
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Question, who wants 100 points?
Alexandra [31]
Me and well thank you
8 0
3 years ago
Read 2 more answers
Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
Nadusha1986 [10]

It is okay to modify photos digitally to improve their appearance as long as it doesn't show what they aren't producing.

<h3>What is Advertisement?</h3>

This is the act of persuading people to buy goods and services and is usually done with the aid of the media.

Pictures are usually taken which have to be in the best shape and quality in order to entice people to buy the goods thereby bringing about higher sales and profit for the company.

Read more about Advertisement here brainly.com/question/1020696

7 0
2 years ago
In MATLAB please.
Leona [35]

Answer:

function [Area,Perimeter,L]=f_circle(x)

 % Area: pi*x^2 area of circle with radius x

 % Perimeter: 2*pi*x perimeter length of circle with radius x

 % x can be a vector

 minargs=1;maxargs=1;narginchk(minargs,maxargs);  % only 1 input accepted

   if ~isequal('double',class(x))                   5 input has to be type double

       disp('input type not double');

       return;

   end

   Area=pi*x.^2;

   Perimeter=2*pi*x;

 end

4 0
3 years ago
Other questions:
  • One disadvantage of using the styles feature of a word processor is that you cannot modify existing styles. true or false
    14·1 answer
  • _____is empty space between the margin and text.
    8·1 answer
  • if your instructors teaching style is very different from your learning preference your best choice is to one work on your weake
    10·1 answer
  • Why is the wizard able to install the printer when an actual print device is not connected to the computer??
    11·1 answer
  • How can the storage model assist in the design of storage networks?
    12·1 answer
  • Which of the following is the shortcut key combination for pasting copied text?
    11·2 answers
  • How can i get games on my chromebook after my school has blocked almost everything... even zoom!
    14·1 answer
  • Reflect on your semester in this class analysis and Design from an overall "experience" perspective
    9·1 answer
  • Discusse five advantages of utilising DBMS over a file based system
    8·1 answer
  • Differentiate between symmetric and asymmetric encryption
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!