1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
12

Agent Hunt is transferring classified files from the CIA mainframe into his flash drive. SSS represents the size of the files on

the drive (in megabytes) after ttt seconds. S=5t+45S=5t+45S, equals, 5, t, plus, 45. What was the file size on the drive before the transfer?
Computers and Technology
1 answer:
stiv31 [10]3 years ago
7 0

Answer:

The size on the drive before the transfer is 45 megabytes

Explanation:

Before transfer, t which is the time in seconds is 0. Therefore given the formula: S = 5t + 45,

substituting t into the formula gives;

S = 5(0) + 45

S = 0 + 45

S = 45

You might be interested in
Internet service providers​ (isp) need to resolve customer problems as quickly as possible. for one​ isp, past data indicates th
I am Lyosha [343]
I think that the likelihood will still be 0.8 as that means that 8 out of 10 calls will be resolved within one hour so the 7 out of 10 falls within that likelihood so therefore the callers can go by that assumption and be fairly confident that they have quite a high likelihood of having their problems resolved within one hour.
3 0
3 years ago
Read 2 more answers
A network administrator enters the command ipv6 router ospf 110 in global configuration mode. What is the result of this command
Zepler [3.9K]

Answer:

The OSPFv3 AS number will be assigned an ID of 110

Explanation:

If we don't have ipv4 addressing previously, we are going to assign the router-id manually.

We are going to receive a message about the assignation manually.

We can assign a router-id with the next line:

#router-id 1.1.1.1

If we already have the ipv4 addressing, the router going to assign the router-id automatically.

4 0
4 years ago
Before sending a packet into a datagram network, the source must determine all the links that packet will traverse between sourc
Llana [10]

Answer:

False

Explanation:

The transport layer is found in both OSI and TCP/IP suite model. It segments and propagates packets across a network. TCP and UDP are protocols in this layer.

UDP is a connectionless protocol, that is to say, it needs no connection for transmission to take place. UDP transfer is unreliable as packets lost are not retransmitted. Unlike the TCP, it's header is smaller and it is faster in transmission, and links to destinations are random and not determined by the source.

3 0
3 years ago
What benefits did evolution realize by using the crm software?
Elza [17]
Hello there!
Answer:
Have included productivity improvements (doubling the number of deliveries for a speci²c time period), enhanced inventory management, automation of picklists, better resource planning, and more e±ective reporting to key stakeholders. Evolution’s CRM system can determine deliveries planned for any future month and the amount of product in stock, helping Evolution reduce stock holding by 40%. When a new patient is keyed onto system, tasks can be generated for Evolution’s team to organize delivery ahead of time. The system automatically generates a pick list for that patient from Evolution’s pharmacy. Managers can see tasks 2 weeks ahead and can allocate resources accordingly. Hoping this helps you! :D
4 0
3 years ago
Which presentation software element can you use to control the speed between slides in a presentation?
Ad libitum [116K]

The answer is the Transition element.

A slide transition in PowerPoint occurs when you move from one slide to another during a presentation. You can control the speed (time spend on a single slide before advancing to the next). We use set duration to set the transition speed. To set the transition speed to a shorter or a larger duration, select the slide and click on the Transitions tab in the Timing group. In the Duration box, type the number of seconds that you want.  


3 0
3 years ago
Read 2 more answers
Other questions:
  • The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
    15·1 answer
  • Write a method isSorted that returns true if the list is in sorted (nondecreasing) order and returns false otherwise. An empty l
    12·1 answer
  • Which browser do most web users use and why do you think that it is that way? Make sure you search online for statistics to conf
    5·1 answer
  • In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
    14·1 answer
  • Which option identifies the two natural wind patterns that move air masses in the United States?
    5·2 answers
  • In the context of the components of a typical expert system, _____ is a software package with manual or automated methods for ac
    15·1 answer
  • Which of the following files should be multiplexed, for safety? (Choose all correct answers.)
    6·1 answer
  • Why is https used in every link of a website?
    8·1 answer
  • Help please this is my last assignment of the year
    5·1 answer
  • What are three ways to protect yourself from identity theft when using your smartphone or computer?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!