1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
4 years ago
8

How do you calculate typing speed

Computers and Technology
1 answer:
Gwar [14]4 years ago
5 0

Answer:

by how many word you type by minute

Explanation:

You might be interested in
Communication protocols, sets of rules agreed to by all parties, are designed in order to:
mote1985 [20]

Group of answer choices.

A. Ensure that cell phones and laptops cannot communicate.

B. Give each country its own internet language.

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

D. Assure that computers and other devices don't pollute the environment.

Answer:

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Additionally, a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.

Hence, communication protocols, sets of rules agreed to by all parties, are designed in order to ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

This ultimately implies, there exist standard frameworks and protocols that are designed and developed to serve pre-existing technologies and devices, as well as those that would be invented in the future.

For example, SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services on an internet-enabled device.

3 0
3 years ago
20<br>Calculate the kinette energy of a body the speed<br>that will be a mass tragm​
jolli1 [7]

Answer:

20

Explanation:

4 0
3 years ago
The image uses a school of fish to symbolize leadership.
timurjin [86]
Front is the answer because the fish is in red while the rest are in blue
5 0
4 years ago
Read 2 more answers
What does it mean when information found from web research is valid?
Mrac [35]

Answer:

The information comes from an official source.

5 0
3 years ago
Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. A bool variable named norecall has been declared . Giv
nikitadnepr [17]

Answer:

The statement (in Python) is as follows:

recalled = modelYear >=2001 and modelYear <=2006

Explanation:

Required

A statement without an if statement to assign true or false to recalled

Using an if statement, the comparison is

if modelYear >=2001 and modelYear <=2006:

    recalled = True

else:

    recalled = False

To rewrite the statement without using the "if" keyword, we simply equate variable recalled to the stated condition i.e.

recalled = modelYear >=2001 and modelYear <=2006

Note that, we assume that there is an input fo variable modelYear

8 0
3 years ago
Other questions:
  • Grace is the sub-editor in a business firm. which feature of a word processing program would she use to make her changes visible
    14·1 answer
  • All of the following are typical characteristics of internet predators, except white. male. between the ages of 18 and 35. high
    7·1 answer
  • A.<br> Post-It note<br> b.<br> notebook<br> c.<br> tutor<br> d.<br> spell check
    14·1 answer
  • What is the computer’s natural language?
    10·1 answer
  • Why is it preferable to code web pages in HTML format?
    6·2 answers
  • WILL MARK BRIAN PLZ HELP PLZ I BEG YOU While levels often change in order to give a game some more variability, they might also
    11·1 answer
  • Selective colleges choose to have in-person meetings to learn more about the applicants. These meetings are called:
    8·2 answers
  • A new school is being built in the local school district.It will have three computer labs with 28 computers each. There will be
    13·1 answer
  • Which of the following is a characteristic of a college savings plan
    6·2 answers
  • A network of people and services with which we share ties and which provide support is.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!