1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
7

The advantages of using a credit card check all that apply

Computers and Technology
1 answer:
drek231 [11]3 years ago
8 0
That if something happens such as some one gets cancer you can pay for it or if you lose your job you can still have time to react and get a new job
You might be interested in
How can IT infrastructure be linked to the business strategy of any organization
Anni [7]

Answer:

The overview of the situation is discussed in the following part.

Explanation:

It's indeed real that perhaps IT technology will have a strategic edge and improved market efficiency. IT technology can improve the protection, accessibility, and efficiency of any enterprise.

Numerous massive, small as well as medium-sized companies or beginning are currently preparing their growth plans by sustaining a stable IT infrastructure throughout the place that will ensure and increase their profitability.

<u>Those same years, the accompanying IT infrastructure is being used to connect the market strategy</u>:

  • Broadband and Wireless Connectivity,
  • Security and Risk Management,
  • IT Structure Strategy,
  • Performance Strategy, etc.
7 0
3 years ago
Which of the following best explains how the Internet is a fault-tolerant system?
IrinaK [193]

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

8 0
2 years ago
Read 2 more answers
Assume the following representation for a floating point number 1 sign bit, 4 bits exponent, 3 bits for the significand, and a b
Andrew [12]

Answer:

Detailed answers given in the solution

Explanation:

a)

max exponent= 1111=15

in biased form =15-7=8

max significant=1111=(.9375)10

max value= 1.9375*28

b) min exp= 0000=0-7=-7(biased)

min value=1.0000*2(-7)

c) Addition : Suppose we want to add two floating point numbers, X and Y.

steps to add floating point numbers:

Make exponents of the two numbers to be the same (if not). We do this by rewriting .

Add the two mantissas of X and the Y together.

If the sum in the previous step does not have a single bit of value 1, left of the radix point, then adjust the radix point and exponent until it does.

Convert back to the one byte floating point representation.

d) Multiplication :

Suppose you want to multiply two floating point numbers, X and Y.

steps to multiply floating point numbers.

sum of the two exponents..

Multiply the mantissa of X to the mantissa of Y. Call this result m.

If m is does not have a single 1 left of the radix point, then adjust the radix point so it does, and adjust the exponent z to compensate.

Add the sign bits, mod 2, to get the sign of the resulting multiplication.

Convert back to the one byte floating point representation, truncating bits if needed.

6 0
3 years ago
You are unpacking and setting up workstations
Anestetic [448]

Answer:

For setting up workstations in classrooms, one end of cables connected into the built in NIC and other end will be connected to a drop.

Explanation:

A drop will be used for connectivity in this case, which will work as connection point in a network. Drops are just like outlets in wall having  Ethernet Jacks where a network device or system can be plugged into it.

8 0
3 years ago
How do you repair a USB?
kaheart [24]

Answer:

You can also try to fix corrupted USB drives with First Aid.

Go to Applications > Disk Utility.

Select the USB drive from the sidebar of Disk Utility.

Click First Aid on the top of the window.

Click Run on the pop-up window.

Wait until the scanning process finished.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Using Python
    14·1 answer
  • What microsoft operating systems started the process of authenticating using password and username
    14·1 answer
  • On what dates did the 2016 Olympics take place( list all)
    9·2 answers
  • Torque is defined as _____.
    7·1 answer
  • Plz help! 3 questions! 1.The ideal light to use is.... A.front light B.a combination of side and back light C.a combination of f
    10·1 answer
  • Susan is keen to learn various safe ways to browse the Internet. She is looking for suggestions that would help her. Which activ
    15·2 answers
  • Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. Promp
    10·1 answer
  • if a second system failure occurs while the first recovery is in progress, what needs tobe done after the system recovers for th
    11·1 answer
  • Describe two different examples of potential conflicts, and explain why these conflicts can have a negative impact on
    14·1 answer
  • Question 4 of 25
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!