1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
14

I just wanna promote my 2 yt channels c: (the channels are in the comments of this question)

Computers and Technology
1 answer:
Inessa05 [86]3 years ago
4 0

Answer:

ok will subscribe to you

You might be interested in
Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
siniylev [52]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • If the array will store in row-major order, then it will be a store like the first row, then second row and then third row.
  • If the user wants to conclude the address of the A[3,5], then the address of the A[3,5] will be 184.
  • It is because the 3 states the row number and the 5 states the column number.
  • The above question states that every value take 8 bit. and there are 4 rows from 0 to 3 and 6 column (0 to 5) for every row (except the fourth rows because it takes 5 columns from 0 to 4) before the A[3,5].
  • So there are 23 value before A[3,5] which are as-- [00,01,02,03,04,05][10,11,12,13,14,15][20,21,22,23,24,25][30,31,32,33,34].
  • So when every value takes 8 bit then 23 value takes 184 bits(23*8).
  • So the address of A[3,4] is 184.
  • Hence option c is the correct and the other is not because of 184 stated from the c option only.
4 0
3 years ago
Which file extension takes less storage space?
anyanavicka [17]

I believe the answer would be the JPEG file extension.

4 0
3 years ago
Read 2 more answers
Your computer sign-in screen is visible, but after you enter your sign-in credentials the computer fails to sign in and present
Step2247 [10]

Answer:

Shift key.

Explanation:

6 0
3 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
What's 3+3 and stop deleting my question i just wasted 41 points
bazaltina [42]

Answer:

I am pretty confident that the answer is 6

Explanation:

3+3=6

3 0
3 years ago
Read 2 more answers
Other questions:
  • Fibre channel switched networks rely on the concept of a ___________________which is a fundamental concept in how the network wo
    10·1 answer
  • The Boffo Balloon Company makes helium balloons. Large balloons cost $13.00 a dozen, medium-sized balloons cost $11.00 a dozen,
    13·1 answer
  • While accessing mail through the mail command interface, a user sees 5 new messages in his mailbox. Since the second message app
    13·1 answer
  • A data set has 60 observations with minimum value equal to 30 and a maximum value equal to 72. The estimated class width using t
    11·1 answer
  • Which security option should be used to ensure the integrity and validity of an Access database?
    15·2 answers
  • What is a worm?
    11·1 answer
  • What does GEOSYNCHRONICE SATELLITE use for?​
    7·2 answers
  • Is doing free lancing from age 16 good or bad?​
    15·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
  • The CIBER network provides a link between the human resource and technology needs of a company with the research capacities and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!