1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
15

What does the binary odometer show about representing large numbers​

Computers and Technology
1 answer:
Gelneren [198K]3 years ago
7 0

Answer and Explanation:

The binary odometer represents the large number to judge that what happened when there is a large number that gets too large

Here we visit the level 2 of the binary odometer widget in the chapter of Code studio

This represents a widget that reproduced an odometer of a car in which the tracking of a device could be known that how much far the car is driven with respect to the miles or kilometers

You might be interested in
Which of the following are correct? I. Hold the middle mouse button to rotate the model on the screen. II. To pan the model, hol
evablogger [386]

Answer:

II and III are correct

Explanation:

The software that the question is referring to here is the computer-aided design (CAD) software called Inventor by Autodesk.

I. Hold the middle mouse button to rotate the model on the screen. False

This will pan the model instead of rotating.

II. To pan the model, hold down the Ctrl key and the middle mouse button. True

Some versions need you to hold down the ctrl key and the middle mouse button to pan, while others is just the middle mouse button then you drag the mouse around. The middle mouse is the scroll wheel on most mice today. You basically, just hold down the scroll wheel as you move the mouse to pan the model.

III. Use the mouse scroll wheel to zoom in and out of the model. True

To zoom in or out, one will need to rotate the mouse scroll wheel forward to zoom in and backward to zoom out.

 

8 0
3 years ago
List some of the ways that healthcare information technology is making healthcare more of a self-service industry?
harkovskaia [24]

Health information technology (HIT)) is "the utilization of data preparing including both PC equipment and programming that manages the capacity, recovery, sharing, and utilization of medicinal services data.

<u>Explanation:</u>

  • Improving personal satisfaction is one of the primary advantages of incorporating new advancements into medication.
  • Restorative advancements like negligibly intrusive medical procedures, better-observing frameworks, and progressively happy with checking gear are enabling patients to invest less energy in recuperation and additional time getting a charge out of a solid life.
  • An essential advantage of offering self-administration checkouts is that clients need them, and effective retailers give what their clients need.
  • The principal innovation is advantageous to people for a few reasons. At the therapeutic level, innovation can help treat increasingly wiped out individuals and subsequently spare numerous lives and battle exceptionally hurtful infections and microscopic organisms.
  • Indeed, three explicit reasons that innovation is acceptable is that it spares lives by improving prescription, keeps us associated with one another, and gives instruction and stimulation.
  • One motivation behind why innovation is acceptable is that it has spared numerous lives.
  • Innovation additionally can be used to improve instructing and learning and help our students be successful.
3 0
3 years ago
g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a
ad-work [718]

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

4 0
3 years ago
A built-in tool that enables you to use text to type in commands for the operating system is called the _____ prompt.
Natalija [7]
Command prompt is the answer and on Apple devices it is called Terminal.
8 0
3 years ago
Read 2 more answers
Usted repetir la pregunta?<br>O A. Es<br>B. Puede<br>C. Puedes<br>O D. Está​
puteri [66]

Answer:

I believe the answer is B. Puede

5 0
3 years ago
Read 2 more answers
Other questions:
  • On what dates did the 2016 Olympics take place( list all)
    9·2 answers
  • How did the discovery of glossopteris support wegner's continental drift hypothesis?
    15·1 answer
  • Which function should be used to display a value based on a comparison ?
    6·1 answer
  • 3.17 (LAB) Ch 5 Warm up: Drawing a right triangle (Python 3) This program will output a right triangle based on user specified h
    10·1 answer
  • Services such as water, electricity, and phone communications are called:
    7·1 answer
  • A cpu handless all the instruction that it recieces from hard ware and software which are available on the computer true or fals
    7·1 answer
  • The force required to slide an object is equal to _____.
    13·1 answer
  • Imagine you were going to use a dedicated workstation for an animation job rather than a personal PC or the all-purpose PCs you
    5·1 answer
  • What is the velocity of a 0.100kg car with a momentum of 5 kgm/s?
    12·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!