1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
3 years ago
5

Construct a group frequency distribution for the following data: 18, 22, 15, 12, 18, 22, 22, 24, 21, 19, 13, 13, 17, 18, 20, 12,

11, 18, 17, 25, 28, 18, 28, 26, 30, 30, 21, 16, 19, 28, 14, 26, 17, 16, 10, 25, 13, 19, 23, 14, 28, 15, 20, 27, 27, 16, 23, 18, 14, 11, 11, 13, 16, 18, 20, 17, 14, 13, 18, 10
i need only these answer pls​
Computers and Technology
2 answers:
makkiz [27]3 years ago
5 0

Answer: based on the passage what can you under about Toni choose the best inference

Explanation:

Toni is thirsty. Toni is sick. Toni is tired. Toni is hungry

Y_Kistochka [10]3 years ago
4 0

Answer:

uhebcuwcih

Explanation:

iqic c .j .c h de c veo  dnjen jndc j .ececiibbec .cecinineijc    

You might be interested in
When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out
maksim [4K]

Answer:

crosstalk

Explanation:

6 0
1 year ago
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
Assume the following representation for a floating point number 1 sign bit, 4 bits exponent, 3 bits for the significand, and a b
Andrew [12]

Answer:

Detailed answers given in the solution

Explanation:

a)

max exponent= 1111=15

in biased form =15-7=8

max significant=1111=(.9375)10

max value= 1.9375*28

b) min exp= 0000=0-7=-7(biased)

min value=1.0000*2(-7)

c) Addition : Suppose we want to add two floating point numbers, X and Y.

steps to add floating point numbers:

Make exponents of the two numbers to be the same (if not). We do this by rewriting .

Add the two mantissas of X and the Y together.

If the sum in the previous step does not have a single bit of value 1, left of the radix point, then adjust the radix point and exponent until it does.

Convert back to the one byte floating point representation.

d) Multiplication :

Suppose you want to multiply two floating point numbers, X and Y.

steps to multiply floating point numbers.

sum of the two exponents..

Multiply the mantissa of X to the mantissa of Y. Call this result m.

If m is does not have a single 1 left of the radix point, then adjust the radix point so it does, and adjust the exponent z to compensate.

Add the sign bits, mod 2, to get the sign of the resulting multiplication.

Convert back to the one byte floating point representation, truncating bits if needed.

6 0
3 years ago
How many frequencies does a full-duplex qam-64 modem use?
Vsevolod [243]

The answer is 2 frequencies.

A Full-Duplex QAM 64 K Modem uses two frequencies. One frequency is used for upstream and the other for downstream. A variety of common QAM forms are available and include, 16 QAM, 32 QAM, 64 QAM, and 256 QAM. For example, for domestic broadcast use, 64 and 256 QAM are used for cable modem and digital cable TV. The modulation scheme for this modem uses both amplitude and phase.

8 0
3 years ago
Read 2 more answers
How to the inverse function of f(x)=x2 +1 ,x>o
Sindrei [870]
    f(x) = x² + 1, x > 0
       y = x² + 1
       x = y² + 1
   x - 1 = y²
√x - 1 = y
√x - 1 = f(x), x > 1
5 0
3 years ago
Other questions:
  • Jorge has $300 for work he performed. He expects to spend the money in the next few weeks to buy a new bike. Which type of accou
    8·1 answer
  • You use_____ to view an XPS file
    10·1 answer
  • Why are prepositions, conjunctions, and pronouns usually considered poor choices to use as key words?
    5·2 answers
  • What is ‘validation’?
    5·1 answer
  • Write an algorithm to determine a students final grade and indicate whether it is passing or failing .the final grade is calcula
    12·1 answer
  • You are part of a team that is setting up a movie streaming service. The company is planning on initially making available 500 m
    9·1 answer
  • Vector testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cr
    7·1 answer
  • Translate the following C++ program to MIPS assembly program. *Please explain each instruction of your code by a comment and sub
    5·1 answer
  • Edhesive Intro to cs quiz 2 q#9 <br><br> What is output? <br> Print (3 % 15)<br> Thanks!!
    8·1 answer
  • Use the drop-down menus to explain what happens when a manager assigns a task in Outlook.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!