1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
4 years ago
12

PLEASE HELP ASAP IT'S DUE TODAY! WILL GIVE BRAINLIEST, FIVE STARS, AND THANKS!! PLEASE HELP!

Computers and Technology
1 answer:
zalisa [80]4 years ago
7 0

Answer:

Well the crash was what exacty

Explanation:

,,,

You might be interested in
What are the basic Mouse actions called and how are they executed
Nata [24]
The left side is a shortcut for 'Enter' the small wheel in the middle is used to scroll your view of the object,The right is used to intialize options pop-up to edit or initiate commands of the intended target


6 0
3 years ago
Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read inform
ryzh [129]
Is known as the binary system
8 0
3 years ago
Read 2 more answers
The equation x + y2-4x+2y=b describes a circle.
liberstina [14]

Answer:

-1

Explanation:

The given equation can be written as

-3x +y^2 +2y +1=b+1

-3x +(y+1)^2=b+1

(-3x-b)+ (y+1)^2=1

This is to be compared with (x-a)^2 + (y-b)^2=c^2

where (a,b) is the center, and c is the radius of the circle.

Thus, we get y=-1, and this is our answer.

6 0
4 years ago
What subnet mask or CIDR notation would be required to maximize the host counts while still meeting the following requirements:
PolarNik [594]

Answer:

192.168.228.0 255.255.255.224

Explanation:

192.168.228.0 255.255.255.128

subnet mask: defines the host and the network part of a ip

CIDR notation : is the shortened form for subnet mask that uses the number of host bits for defining the host and the network part of a ip

For example: 192.168.228.0 255.255.255.128 has CIDR equivalent of 192.168.228.0\25

To have atleast 20 hosts

20 ≤ (2^x) -2

x ≈5

with 5 host bits, we have 2^5-2 = 30 hosts per subnet

and 2^3 = 8 subnets

To get the subnet mask, we have 3 network bits

1110000 to base 10 = 2^7 + 2^6 +2^5= 224

192.168.228.0 255.255.255.224

5 0
3 years ago
Write any 5 activities that help to remove bad events from the society?​
vova2212 [387]

Answer:

1. Awareness program

2. Education

3. women empowerment

6 0
3 years ago
Read 2 more answers
Other questions:
  • The mouse and keyboard are also sometimes called
    5·1 answer
  • Slmething about device for defrosting windscreen?
    5·1 answer
  • Why is fluency in information technology becoming increasingly important for many college majors?
    9·2 answers
  • Which category of software would programming languages fall into?
    8·2 answers
  • Suppose that the following elements are added in the specified order to an empty binary search tree: Lisa, Bart, Marge, Homer, M
    5·1 answer
  • Which type of memory helps in reading as well as writing data?
    7·1 answer
  • Technician A says that a lead acid battery uses straight Hydrochloric acid for electrolyte. Technician B says that a lead acid b
    10·2 answers
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • What does this map key show
    12·1 answer
  • Submit a report outlining the steps you will take to obtain digital evidence. In your report you must include the legal requirem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!