1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
3 years ago
6

Probability can be used to determine the likelihood of specific __________

Computers and Technology
2 answers:
kupik [55]3 years ago
6 0
B occurrences because you taking the probability of something <span />
Minchanka [31]3 years ago
4 0
The answer is b of course
You might be interested in
When you format text, what are you doing?
vova2212 [387]

Answer:

d

Explanation:

7 0
4 years ago
Read 2 more answers
Cool fchgjvkugyftdycfhgjkliugytbnhmjku
alexandr1967 [171]

Answer:

the cats face XD

Explanation:

3 0
3 years ago
A sensitivity analysis is another name for what analysis
erastova [34]
<span>another name for what-if analysis   (that what is is called "what-if analysis" </span>
5 0
3 years ago
List and briefly define the four main elements of a computer.​
777dan777 [17]
-Processor(CPU)
The processor is the important element of the computer. It controls all the operations that are performed by the computer.
-Main Memory(RAM):
The main memory is referred as the primary memory. It is volatile in nature.
It stores the data and programs temporarily. It is a temporary memory.
-I/O Modules:
The I/O modules moves the data between the computer and other peripheral devices of the system.
-System Bus:
The bus that connects the CPU to main memory on the mother board, I/O modules and other components within the system.
7 0
3 years ago
Spanning Tree Protocol (STP) is a loop-prevention mechanism used in modern networks. STP is, however, vulnerable to misconfigura
maks197457 [2]

Answer:

Any of the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

Explanation:

Given that STP an acronym of Spanning Tree Protocol, and its major purpose is to stop the bridge loops and the broadcast radiation that emanates from its topology.

Cisco carried out three instruments or tools to protect the STP topology. These protection tools accompany the STP, and they are the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

3 0
3 years ago
Other questions:
  • Speaker,printers, and monitors are all considered what?
    10·2 answers
  • Stock ____ firms trade financial securities between a buyer and a seller.
    11·1 answer
  • You type. The word "weather" when you ment "whether" when will the writer or word flag this as a misspelling or a grammar proble
    13·1 answer
  • In which of these places might you be most likely to find a peer-to-peer network? On the Internet In a hospital In a home In a l
    5·2 answers
  • Which of the choices Sean are not true when considering virus behavior
    9·1 answer
  • If a employee has a grade grater than or equal to 18, then he she will get 50% bonous on the basic pay. Otherwise, the employee
    5·1 answer
  • What is ur favorite color and why
    9·2 answers
  • 8. Explain strategies employed by the operating system to ensure safety of programs and data in
    15·1 answer
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
  • A toolbar of round buttons that appear when you move the mouse when in Slide Show view id called ____________.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!