1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
3 years ago
11

Two ways that a deer depends on plants to survive

Computers and Technology
2 answers:
Nastasia [14]3 years ago
4 0
Food and oxygen would be the answer
a_sh-v [17]3 years ago
4 0
1) Food
2) Oxygen (They get it from the carbon dioxide)
You might be interested in
1. Distinguish between
shtirl [24]

Answer:

They use principles of light to scan document

Magnetic scanning

Explanation:

5 0
2 years ago
What is the best kernel synchronization solution on multicore systems when a lock is held for brief periods ?
Delvig [45]

Answer: C) spin-lock with test and set

Explanation:

In spinlock, when a thread locks a spinlock then it continuously retrying locking until it succeeds. Spinlock is the lock that cause thread and continuously check that whether the lock are available or not for synchronization.

So that is why spinlock is best synchronization solution as it is not allowing any another thread.

On the other hand, in mutex thread try to lock a mutex and then, it automatically go to sleep mode before locking and immediate allow another thread to run.

8 0
3 years ago
Please answer immediately!!!
diamong [38]

Answer:

Please check the attachment.

Remember:

All N1, N2, N3N, N4, N5, N6, N7 and each of them are certainly like the server. Also note that Router, repeaters, switch and transmitter are not mentioned in the above diagram. Please assume it in between each location.

Explanation:

Please check the attachment. Also, Remember that Server is at the head office, and rest 7 are the 7 branches. The VOIP, video surveillance, Door security system and the computer networks are being shown in the diagram. And each location has a network of computers joined through VLAN, and each of them are given the IP addresses of Class A, Class B and class C of the iPV4(or IPV6), which can be found by the future network administer, operators through the IP address, that is assigned.  

4 0
3 years ago
What is the location used by users to configure delegate access on their own mailboxes? Backstage view > Account Settings Bac
abruzzese [7]

Answer:

A: Backstage view > Account Settings

Explanation:

7 0
3 years ago
Is a protocol that allows users to log on to and access a remote computer?
kompoz [17]
The answer is yes I hope this help ya out

6 0
3 years ago
Other questions:
  • The google android mobile operating system is a proprietary system, for use on only approved devices.​
    10·1 answer
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • If you specify a user without specifying a hostname, mysql will
    13·1 answer
  • To see a custom, object-specific action on the palette of the page layout editor: A. Click Layout Properties on the page layout
    11·1 answer
  • You have a multi-domain Windows Server 2008 forest. You need to make a shared folder available to users from several domains. Wh
    9·1 answer
  • Write the definition of a function named quadratic that receives three double parameters a, b, c. If the value of a is 0 then th
    12·1 answer
  • Go online and research the computer topic
    6·1 answer
  • To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted dec
    9·1 answer
  • Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user.
    13·1 answer
  • Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 ​n ​​ and that executing an implementation o
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!