1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
5

The point in the lens where inversion occurs is called

Computers and Technology
1 answer:
makvit [3.9K]3 years ago
7 0
I’m not sure what you asking you have a picture ?
You might be interested in
When connecting a trunk link between two switches, it is important to configure the allowed VLANs correctly on either end. If th
Len [333]

Answer: A VLAN mismatch

Explanation:

 The VLAN mismatch is the process when the both ends of the truck line are not connected correctly and properly between the two switches.

  • The configuration of the VLAN is done correctly as it is important to connecting the VLAN on either of the ends for avoiding the VLAN mismatch occurrence.
  • By default the truck allow the VLAN 2094 for traversing the trunk by using the native VLAN in the form of VLAN 1.

Therefore, VLAN mismatch is the correct answer.

4 0
3 years ago
Compilers can have a profound impact on the performance of an application. Assume that for a program, compiler A results in a dy
Naddik [55]

Answer:

The answer is "1.25"

Explanation:

{CPU \ time}= {instructions \times  CPI \times  cycle\  time}

\therefore\\\CPI= \frac{CPU \ time}{instructions \times cycle \ time} \\\\cycle \ time = 1 \\\\ns = 10^{-9} s \\

Also for this context, it executes the time =  CPU time. So, the compiler A, we has

CPI_{A}= \frac{CPU \ time_{A}} {instructions_{A} \times cycle \ time}= \frac{1.1 s}{10^{9} \times 10^{-9} s}= 1.1

For compiler B, we have

CPI_{B}= \frac{CPU \ times_{B}} {instructions_{B} \times cycle \ time}

         = \frac{1.5\ s}{ 1.2 \times 10^{9} \times 10^{-9} \ s}\\\\= \frac{1.5}{ 1.2 }\\\\= 1.25

3 0
3 years ago
Which of the following are examples of security threats?
svetoff [14.1K]

Answer:

b,c.d

Explanation:

bc i got it wrong

3 0
1 year ago
State and explain five misused of science and technology​
Nonamiya [84]

Answer:

1. Perpetration of violence

2. Breach of privacies

3. Replacement of human labor

4. National threats

5. Devotion of excessive time to technologies

Explanation:

The advent of science and technology have come with lots of benefits to man. Some of these benefits include, the invention of phones, electricity, the internet and social media, satellites, drones, etc. However, science and technology have been misused in the following ways;

1. Perpetration of violence: Weapons of war have caused the mass destruction of more people than was obtainable before. To aid these activities the fast means of communication and transportation cause seamless operations.

2. Breach of privacies: People with technical knowledge have the ability to intrude into the privacies of others. They can obtain information that was not originally meant for them.

3. Replacement of human labor: Machines and equipment have reduced the number of humans that were gainfully employed prior to the advent of these technologies.

4. National threats: Nations and governments now threaten their counterparts with the deployment of missiles. These attitudes aid international conflicts.

5. Devotion of excessive time to technologies: Teenagers most especially have developed an overdependence on technologies. A lot of time is now spent on phones, thus causing the neglect of social relationships.

5 0
2 years ago
How to write an inequality on a computer?
Artyom0805 [142]
For all numbers, be sure to use the keypad (on the right end of the keyboard), not the number keys (along the top of the keyboard). 

<span>≥     Hold down the Alt key, then type 242. </span>
<span>≤     Hold down the Alt key, then type 243 </span>

<span>For ≅, ≟, ≠, you need to use the Character Map.</span>
6 0
3 years ago
Other questions:
  • True or false the primary advantage of the worksheet is the ability to solve numerical problems quickly and accurately
    11·1 answer
  • What is the term for a device that converts digital data from a computer into analog signals and back again?
    9·1 answer
  • A grade of B is worth Grade points<br><br><br> A) 3.0<br> B) 80<br> C)2.0<br> D)4.0
    13·2 answers
  • Fact Pattern: A sales transaction record designed to contain the information presented below. Column Information 1-10 Customer a
    13·1 answer
  • In the context of the box model, what is the difference between a margin and padding
    8·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which a
    8·1 answer
  • Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entrega
    10·1 answer
  • List three features of the third generation of computers
    13·1 answer
  • What is contained in the Open Files section of Shared Folders? ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!