1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
4 years ago
15

A factory has a dedicated room just for computers. They are generally kept locked in the room and are never directly used by use

rs.
Which of the following is NOT true:

That room is part of the infrastructure.
Those computers are servers.
Those computers are part of a network.
Those computers form an architecture.
Computers and Technology
2 answers:
Pavel [41]4 years ago
4 0

those computers are part of a network. :)


trasher [3.6K]4 years ago
3 0
I'm pretty sure it's the network one
You might be interested in
What are two reasons for entering the ping 127.0.0.1 command on a windows pc?
Hunter-Best [27]

127.0.0.1 is the loopback Internet Protocol (IP), the address is used to establish an IP connection to the same computer being used by the end-user.

The some reason that a person will command a ping 127.0.0.1 in a command prompt is because they will check if the NIC and drivers implementation is functional and it used in testing the TCP/IP.

4 0
4 years ago
Read 2 more answers
The program below is used to calcualte the sum of 3 numbers. There is an error in this program. Which line contains the error? n
djyliett [7]

Answer:

  1. num1=10
  2. num2 =20
  3. num3="30"
  4. sum = num1+num2+num3
  5. print (num1)
  6. print (num2)
  7. print (num3)
  8. print (sum)

The error is at line 3. The variable num3 has been assigned a string value with use of the quotes.

To fix the error, take away the quotes from the number 30, since the arithemetic operation cannot be carried out on the string in python program language.

Explanation:

5 0
3 years ago
What kind of networking is only for the use of people within the company
zaharov [31]
LAN = Local Area Network
6 0
3 years ago
Read 2 more answers
What should not be compromised when trying to meet standards and deadlines?
n200080 [17]
A i believe is the answer
5 0
4 years ago
Give big-O estimate for the number of operations (multiplication or addition) used in the following algorithm segment (ignore co
Novay_Z [31]
<span>'m pretty sure the big O is actually O(log n) Not really a proof but anyway. If you write out the values before each iteration of the loop you get. L - iteration number L i t 1 1 0 2 1 2 3 3 6 4 9 18 5 27 54 6 81 162 So if n was 80 it would take 6 iterations You can see i is growing like 3^(L-2) So if n was 1000 1000 = 3^(L-2) log(1000) [base 3] = L - 2 log(1000) [base 3] + 2 = L 8.287709822868152 = L and if you ceil the answer you get L = 9 and just to check with the table 6 81 162 7 243 486 8 729 1458 9 2187 ... The table isn't perfect but hopefully you get the main idea.</span>
6 0
4 years ago
Other questions:
  • Why does fiber optic communication technology have a significant security advantage over other transmission technology? higher d
    6·1 answer
  • PPE that should be used by every technician include all of the following, EXCEPT
    6·2 answers
  • Parallel tangent and coincident are examples of what
    13·1 answer
  • A(n ________ is information that is passed to a function, and a(n ________ is information that is received by a function.
    15·1 answer
  • Clicking a _____ takes you to a webpage that no longer exists or has been moved.
    9·2 answers
  • How are entries ordered in a reference list
    9·1 answer
  • Which of the following is an example of an access object?
    9·1 answer
  • What command would Emile use in his word processing software to insert a bar chart that will automatically adjust to changes mad
    6·2 answers
  • Calculator is an example of
    14·1 answer
  • Gourmet pizza shop with a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!