1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
3 years ago
15

The three of hazards​

Computers and Technology
1 answer:
Paul [167]3 years ago
6 0

Answer:

Please be more specific

Explanation:I take digital technology information so I might be able to help you.

You might be interested in
What is the differnces between dark and middle ages of computer?​
noname [10]
The "middle ages" are anything between the collapse of Rome (400 AD) to its re-emergence in Rennaissance Italy (1400). Rennaissance means "rebirth". The "dark ages" are the period in the middle ages which were relatively undocumented. This would definitely include 400 AD to 700 AD, and some extend it to 900 AD.
3 0
3 years ago
What is the preferred procedure for putting customers on hold​
vesna_86 [32]

Answer/Explanation:

Explain the reason you need to put the caller on hold.

Ask for the person's phone number, in case the conversation is cut off.

Promise to return in a minute—or your best estimate of how long the hold will last. If you think the delay will be longer than a couple of minutes, ask for a number and a time when you can call back.

If, despite your best efforts, the delay is taking longer than anticipated, check in with the caller so that he doesn't feel abandoned. Again, offer to call back, "rather than keep you holding."

When you return to the phone, apologize for the inconvenience and thank the caller for his patience.

Use the caller's name frequently to add a sense of connection.

The first step you can take when putting a caller on hold and making it a satisfying experience is a systematic one. When a caller is on hold, 60 seconds seems like an eternity, so see if you can program the phone system to play music (calming classical or jaunty jazz is best) to break this perception of an interminable wait. Aside from that, however, putting someone on hold in a professional way depends on your behavior. The golden rule to keep in mind is as follows: how would you like to be treated if you were on the other end of the line?

MAKE ME THE BRAINLIEST!!!!!!!!!!!!

8 0
3 years ago
Read 2 more answers
A.Distance sensor<br> b.Programable microcontroller<br> c.Ambient light sensor<br> d.Wi-Fi
Rainbow [258]

D WiFi

It uses wifi to connect to the internet

3 0
3 years ago
Read 2 more answers
Discuss the DMA process​
shusha [124]

Answer:

Direct memory access (DMA) is a process that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations and this process is managed by a chip known as a DMA controller (DMAC).

Explanation:

A defined portion of memory is used to send data directly from a peripheral to the motherboard without involving the microprocessor, so that the process does not interfere with overall computer operation.

In older computers, four DMA channels were numbered 0, 1, 2 and 3. When the 16-bit industry standard architecture (ISA) expansion bus was introduced, channels 5, 6 and 7 were added.

ISA was a computer bus standard for IBM-compatible computers, allowing a device to initiate transactions (bus mastering) at a quicker speed. The ISA DMA controller has 8 DMA channels, each one of which associated with a 16-bit address and count registers.

ISA has since been replaced by accelerated graphics port (AGP) and peripheral component interconnect (PCI) expansion cards, which are much faster. Each DMA transfers approximately 2 MB of data per second.

A computer's system resource tools are used for communication between hardware and software. The four types of system resources are:

  •    I/O addresses
  •    Memory addresses.
  •    Interrupt request numbers (IRQ).
  •    Direct memory access (DMA) channels.

DMA channels are used to communicate data between the peripheral device and the system memory. All four system resources rely on certain lines on a bus. Some lines on the bus are used for IRQs, some for addresses (the I/O addresses and the memory address) and some for DMA channels.

A DMA channel enables a device to transfer data without exposing the CPU to a work overload. Without the DMA channels, the CPU copies every piece of data using a peripheral bus from the I/O device. Using a peripheral bus occupies the CPU during the read/write process and does not allow other work to be performed until the operation is completed.

With DMA, the CPU can process other tasks while data transfer is being performed. The transfer of data is first initiated by the CPU. The data block can be transferred to and from memory by the DMAC in three ways.

In burst mode, the system bus is released only after the data transfer is completed. In cycle stealing mode, during the transfer of data between the DMA channel and I/O device, the system bus is relinquished for a few clock cycles so that the CPU can perform other tasks. When the data transfer is complete, the CPU receives an interrupt request from the DMA controller. In transparent mode, the DMAC can take charge of the system bus only when it is not required by the processor.

However, using a DMA controller might cause cache coherency problems. The data stored in RAM accessed by the DMA controller may not be updated with the correct cache data if the CPU is using external memory.

Solutions include flushing cache lines before starting outgoing DMA transfers, or performing a cache invalidation on incoming DMA transfers when external writes are signaled to the cache controller.

4 0
3 years ago
Read 2 more answers
You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the
Bezzdna [24]
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
5 0
3 years ago
Other questions:
  • Arpanet was developed by the united states so that there was a communication network that would survive a nuclear war. True or F
    11·1 answer
  • Explain the difference between general-purpose and specialized applications. Also discuss the common features of application pro
    11·1 answer
  • What does the int size = sizeof buffer / sizeof * buffer means ?
    7·1 answer
  • When creating a scene in Blender, you should change Blender Render to ______ to create the best lighting option?
    15·1 answer
  • 1. Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is
    15·1 answer
  • All of the following are examples of service learning opportunities exept
    11·1 answer
  • Given that add, a function that expects two integer parameters and returns their sum, and given that two variables, euro_sales a
    7·1 answer
  • The acronym pies is used to describe improvised explosive devices (ied) components. pies stands for:
    13·2 answers
  • Each drop-down menu.
    8·1 answer
  • 5. Nadia wants to calculate the total interest, which is the total amount of the payments minus the loan amount. In cell F6, ent
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!