1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
7

NumHours = 5

Computers and Technology
1 answer:
Sever21 [200]3 years ago
8 0
The answer is numMinutes = 30
You might be interested in
Why do i get message notifications but when i click on it it says i have no new messages?
jeka57 [31]

Answer:

Might just be a glitch you should try to ignore it for the time being or you can log out then log in to your acc

Explanation:

good luck

4 0
3 years ago
What are the details of frame transmission andreception that LAN interface handles?
Vanyuwa [196]

Answer and Explanation:

LAN transmission and reception handles the given bellow details  

  • LAN adds hardware address and use for error detection codes
  • Use DMA to copy frame data directly from main memory
  • it follows access rule then transmission is in progress
  • it also check the address where data is sent on incoming frames

if the destination address completely match with location address a copy of the frame is passed to the computer

in LAN system a single pocket is sent to the one or more nodes  

4 0
4 years ago
A)​What would be the state of the following list after each of the first four passes in a Bubble sort, sorting into ascending se
nata0808 [166]

Answer:

Three passes will be required

MARK ME AS BRAINLEST

8 0
2 years ago
A peripheral can be used to tell a computer to complete a specific task.<br> A) True <br> B)False
RoseWind [281]

Answer:

A. true

Explanation:

<em><u>because</u></em><em><u> </u></em><em><u>you</u></em><em><u> </u></em><em><u>can</u></em><em><u> </u></em><em><u>complete</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>without it</u></em><em><u> </u></em><em><u>mistakes</u></em><em><u> </u></em><em><u>if</u></em><em><u> </u></em><em><u>your</u></em><em><u> </u></em><em><u>using</u></em><em><u> </u></em><em><u>an</u></em><em><u> </u></em><em><u>computer</u></em><em><u> </u></em><em><u>but</u></em><em><u> </u></em><em><u>if</u></em><em><u> </u></em><em><u>you</u></em><em><u> </u></em><em><u>use</u></em><em><u> </u></em><em><u>an</u></em><em><u> </u></em><em><u>paper</u></em><em><u> </u></em><em><u>you</u></em><em><u> </u></em><em><u>will</u></em><em><u> </u></em><em><u>make</u></em><em><u> </u></em><em><u>mistakes</u></em><em><u> </u></em><em><u>over</u></em><em><u> </u></em><em><u>and</u></em><em><u> </u></em><em><u>over</u></em>

8 0
3 years ago
Good Morning! Please Help!
vova2212 [387]

Answer:

cyber bullying

rights

technology

speech

education

study

issues

Explanation:

4 0
3 years ago
Other questions:
  • How to ask for a letter of recommendation via email?
    10·1 answer
  • A(n) ____ database is an application appropriate for an object-oriented database that contains text links to other types of docu
    7·1 answer
  • How to eject a flash drive from chromebook?
    6·1 answer
  • Peter accumulated many photos from his visit to Wisconsin. He wants to upload these photos to a social networking site. Which fi
    12·1 answer
  • What port does the DarkComet malware listen on?
    15·1 answer
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    9·1 answer
  • Why operating system is important software for a computer give five reasons
    13·1 answer
  • Weak Induction
    8·1 answer
  • Before her shift as a cashier at the grocery store, Carla pulls her hair back into a ponytail and makes sure her fingernails are
    15·2 answers
  • An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!