1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
4 years ago
6

Secondary sources information gathered from primary sources.

Computers and Technology
2 answers:
sergeinik [125]4 years ago
8 0

Answer:

what

Explanation:

Svet_ta [14]4 years ago
4 0

Answer:

i think its translate

Explanation:

You might be interested in
If the user enters 26 what is output? _____________
MArishka [77]

Please write the whole question, is it asking for the function that requests user input?

3 0
3 years ago
Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
steposvetlana [31]

Answer:

Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.

High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.

So,Yes bit stuffing is necessary in control field.

7 0
4 years ago
Which of the following best describes cost-benefit analysis?
d1i1m1o1n [39]

Answer:

A

Explanation:

7 0
3 years ago
Which rule should be followed to stay safe online
yan [13]

Answer:

The rule that should be followed to say safe online is to never give out your personal information

Explanation:

because they can hack you.....

5 0
4 years ago
Chris has just graduated from high school. He hopes to complete a carpenter's apprenticeship and eventually open his own busines
malfutka [58]
I would want to say a goal.
4 0
3 years ago
Read 2 more answers
Other questions:
  • In the simulation, player 2 will always play according to the same strategy. The number of coins player 2 spends is based on wha
    6·1 answer
  • What is the command to use the memory diagnostics tool?
    11·1 answer
  • A user is trying to delete a file located on an NTFS volume on his Windows 8 computer but is unable to do so. Why is this?
    6·1 answer
  • Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
    15·1 answer
  • Write a program named convertdate that converts a date entered by the user into another form. the user's input will have the for
    8·1 answer
  • What's a good drawing tablet?
    12·2 answers
  • Hi weegy, what is the latest android os?
    9·1 answer
  • Please help!! i need this asap &lt;3 <br> (the boxes have the same answer choices in both)
    7·2 answers
  • Write a function named partfthat takes inas parameterstwo parallel lists: a list of times (in increasing order), and a list of d
    7·1 answer
  • Computers were originally developed to accomplish various tasks in relative isolation, very different from the collaboration and
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!