1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
7

Before becoming romantically involved with a coworker you should

Computers and Technology
2 answers:
astra-53 [7]3 years ago
7 0
You should make sure no one is looking and make sure you have protection
snow_lady [41]3 years ago
5 0
Get to know them ask if they like anyone if they don't say anything it might be you ask there friends if they like you or not.
You might be interested in
Audra recently earned her associate’s degree and is looking for a job. Her resume lists her strengths in a separate section. Som
zhuklara [117]

With Audra’s associate degree and list of qualifications, she will be looking for an entry-level position. The position that would be most suitable for her would be (D) auditing clerk.

She will not quality for an Accountant and Marketing Manager position, which requires a longer amount of experience as well as a higher degree of education, and she is overqualified for the Data Entry position which does not require her level of qualifications.

8 0
3 years ago
Read 2 more answers
⦁ Consider transferring an enormous file of L bytes from Host A to Host B. Assume an MSS of 536 bytes. ⦁ What is the maximum val
timurjin [86]

Answer:

a)  There are approximately  2^32 = 4,294,967,296 possible number of the sequence. This number of the sequence does not increase by one with every number of sequences but by byte number of data transferred. Therefore, the MSS size is insignificant. Thus, it can be inferred that the maximum L value is representable by 2^32 ≈ 4.19 Gbytes.

b)  ceil(2^32 / 536) = 8,012,999

The segment number is 66 bytes of header joined to every segment to get a cumulative sum of 528,857,934 bytes of header. Therefore, overall number of bytes sent will be 2^32 + 528,857,934 =  4.824 × 10^9 bytes.  Thus, we can conclude that the total time taken to send the file will be 249 seconds over a 155~Mbps link.

Explanation:

a)  There are approximately  2^32 = 4,294,967,296 possible number of the sequence. This number of the sequence does not increase by one with every number of sequences but by byte number of data transferred. Therefore, the MSS size is insignificant. Thus, it can be inferred that the maximum L value is representable by 2^32 ≈ 4.19 Gbytes.

b)  ceil(2^32 / 536) = 8,012,999

The segment number is 66 bytes of header joined to every segment to get a cumulative sum of 528,857,934 bytes of header. Therefore, overall number of bytes sent will be 2^32 + 528,857,934 =  4.824 × 10^9 bytes.  Thus, we can conclude that the total time taken to send the file will be 249 seconds over a 155~Mbps link.

8 0
3 years ago
Write a function named average_value_in_file that accepts a file name as a parameter and reads that file, assumed to be full of
noname [10]

def average_value_in_file(filename):

   f = open(filename)

   total = 0

   count = 0

   for x in f.read().splitlines():

       total += int(x)

       count += 1

   return total/count

print(average_value_in_file("input.txt"))

I used an input file that looks like this:

1

1

1

1

6 0
3 years ago
Jeff types a sentence She wore a new dress yesterday. He erroneously typed w instead of e in the word dress. What is the accurac
antoniya [11.8K]
96 i believe i'm not too certain on this one
6 0
3 years ago
Read 2 more answers
Two double quotation marks with no space in between is referred to as the ____ string.
Andrew [12]
Empty
................
7 0
3 years ago
Other questions:
  • Why do you think LinkedIn has become so popular?
    6·1 answer
  • Where can you check effective access on a shared folder? answer?
    11·1 answer
  • The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
    13·1 answer
  • Is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking
    9·1 answer
  • If you're unsure if something
    9·2 answers
  • One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but
    15·1 answer
  • Examine the exhibit above. "Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub. Which of the following
    13·1 answer
  • ANSWERED CORRECT BELOW
    7·1 answer
  • A picture drawn in 3 d is called?​
    14·2 answers
  • Choose 2 statements that correctly describe the time complexity of data structures with N data.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!