1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
10

In ancient times what did kings and tribals chiefs use to communicate

Computers and Technology
1 answer:
mel-nik [20]3 years ago
8 0

Answer:

they used sign language to communicate and also pegion was used to communicate

You might be interested in
A(n) _____ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function i
kirza4 [7]

Answer:

GigaPOP

Explanation:

<em>A gigabit point of presence, also known as GigaPOP is a single entry point to Internet2, which is a high-speed IP network managed by institutions and other organizations. Gigabit Points of Presence generally handle data transmission rates of one gigabit per second or more.</em>

8 0
2 years ago
What command is used to generate an RSA key pair?
Leokris [45]

Answer:

D) crypto key generate rsa

Explanation:

In cryptography, the RSA refers to Rivest–Shamir–Adleman. This is an algorithm used for encrypting and decrypting messages in computers thereby ensuring secured transmission of data. In order to generate an RSA key pair, you will use the command crypto key generate rsa while in the global configuration mode. This command has the following syntax:

crypto key generate rsa [general-keys| usage-keys| signature| encryption] [<em>labelkey-label</em>] [exportable] [modulus <em>modulus-size</em>] [storage <em>name of device</em>:][redundancy][on <em>name of device</em>:],

with each parameter having its description

5 0
3 years ago
Whats a field in databases?
SVETLANKA909090 [29]
A field is a single attribute of an entity, object or event.
3 0
3 years ago
For each vertex v of the DAG, in the topological ordering, compute the length of the longest path ending at v by looking at its
FromTheMoon [43]

Answer:

Following are the step by step algorithms is explain below.

Explanation:

Following are the algorithm for searching shortest distances.

  • Firstly, Initialize the array variable distance[] = {INF, INF, ….} as well as distance[s] = 0 in which the variable 's' is the beginning vertex
  • Then, you have to develop a topological order of the following vertices.
  • So, Do in the following for mostly vertex that is the variable 'u' in the topological order.

          Do on the following for mostly contiguous vertex that is 'v' of 'u'

                         if (dist[v] > dist[u] + weight(u, v))

                               dist[v] = dist[u] + weight(u, v)

8 0
3 years ago
Which of the following is not a type of computer network
laila [671]
The answer is City Area Network.
Local Area Network, Metropolitan Network, and Wide Area Network are only some of the types of network. LAN is a network of computers in a single site usually in a single office building. While MAN, is a network of computer across an entire city or a small region. WAN is a very large area of network such as the Internet.
8 0
3 years ago
Other questions:
  • Which of the following can be sources of sediment? A. fragments of other rocks B. chemicals and minerals dissolved in water C. s
    11·1 answer
  • Which of the following variable declarations is a correct assignment?
    14·1 answer
  • How did people find the first ever piece of tech?
    6·1 answer
  • You are an administrator for a large corporation and you are responsible for deploying computers often and quickly. Which server
    5·1 answer
  • Which of the following is NOT a design choice when using the ER model?
    5·1 answer
  • Although you are not a full administrator, you are asked to manage a protected document, allowing customized access to any inter
    7·1 answer
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • Why do we use antivirus program?<br><br>please tell fast​
    12·1 answer
  • Which of the following allows you to copy
    15·1 answer
  • Which of the following commands can be used to display socket information out to the terminal screen
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!