1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
4 years ago
7

How much will your assignment be docked if you turn it in late?

Computers and Technology
2 answers:
o-na [289]4 years ago
7 0
We don’t know ms.Fredrick, you’re on your own here
dimaraw [331]4 years ago
3 0

Answer:

This would be a classroom discussion, But here ill try I guess,

Maybe  None since Ms. Frederick doesn't accept late work  because I dont know her

You might be interested in
John wants to access specific programs from the Start menu in his laptop. However, he is unable to view them when he clicks the
Helen [10]
I believe the answer is C, to get to the program he would either reset his laptop or right click then run.
6 0
3 years ago
Read 2 more answers
TensorFlow and Pytorch are examples of which type of machine learning platform?
andre [41]

TensorFlow and Pytorch are examples of Supervised Machine Learning (ML), in addition, both support Artificial Neural Network (ANN) models.

<h3>What is a Supervised Machine Learning?</h3>

Machine learning (ML) is a subcategory of artificial intelligence that refers to the process by which computers develop pattern recognition or the ability to continually learn or make predictions based on data, and then make adjustments without being specifically programmed to do so.

In the supervised machine learning, the computer is given a labeled dataset that allows it to learn how a human does a task. This is the least complex model as it attempts to replicate human learning.

see more about computing at: brainly.com/question/2175764

#SPJ1

5 0
2 years ago
Why are men more exposed to mass media?
adell [148]

Answer:

because they like exploring

8 0
2 years ago
Read 2 more answers
Given code:public abstract class A{ }public class B extends A{}The following code sequence would correctly create an object refe
kondaur [170]

Answer:

True.

Explanation:

In the code given in the question we have an abstract class A.Then we have a class B which inherits the class A it is also an example of single inheritance.

Line A c; creates a reference of A type.

Line c=new B(); states that the reference of A type will refer to an object of class B.

Hence we conclude that the answer is True.

6 0
4 years ago
A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best expla
mariarad [96]

Answer:

The correct option is d. Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Explanation:

Bandwidth can be described as the maximum data transfer that an internet connection or a network has. It gives a measure of the amount of data that can be transmitted over a particular connection in a particular amount of time. For instance, the capacity of a gigabit Ethernet connection is 1,000 megabits per second (Mbps) (which also translates to 125 megabytes per second).

Therefore, when a local router is configured to limit the bandwidth of guest users connecting to the Internet, it will restrict the the maximum amount of data that they can transmit per second.

Therefore, the correct option is d. Guest users will be restricted in the maximum amount of data that they can send and receive per second.

3 0
3 years ago
Other questions:
  • You work for a large enterprise company that handles time-sensitive information. Your supervisor has asked that you set up a con
    8·1 answer
  • In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the enti
    9·1 answer
  • Write a program that opens a text le called quiz.txt for reading. This le contains a single line with a student's rst name then
    15·1 answer
  • What makes Group Policy such a powerful tool is its ability to enable security administrators to:_________.
    8·1 answer
  • The CPU package is installed using the ____ process
    7·1 answer
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
  • ফাইল ও ফোল্ডারের মধ্যে পার্থক্য কি এবং ৫ টি ইনপুট ডিভাইসের নাম কি​
    7·2 answers
  • PLEASE HURRY!!!<br> Look at the image below
    5·1 answer
  • "You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that app
    14·1 answer
  • Write getfirstroot and getsecondroot to return the first and second roots. return a domain_error is there is no first or second
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!