1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
3 years ago
10

What is the age group for the silent genration

Computers and Technology
1 answer:
Maurinko [17]3 years ago
7 0
21 years old. If you take 1944-1923 you get 21 because that would be ho wold they are
You might be interested in
Which camera options shows time to be slowly
serious [3.7K]

Answer:

.25 speed or slo mo (when recording on phone)

8 0
3 years ago
In the lan protocol architecture the _________ layer is responsible for detecting errors and discarding any frames that are in e
Korolek [52]
The MAC (Medium Access Control) layer is responsible for this.
7 0
3 years ago
Which is the purpose of adding B-Roll footage to a sequence?
pav-90 [236]

Answer:

To add richness in content – B-roll footage is used to increase the depth of the main footage and improve storytelling.

Explanation:

Hope this helps

7 0
4 years ago
Wireless technology’s greatest strength, allowing access without being connected to the network by wires, is also its greatest w
solong [7]

Answer:

True

Explanation:

WLANs and WANs uses wireless networking to communicate within end devices in a network. Cable networks are restricted to only a fixed area or location like a building but wireless networking surpasses that problem of immobility. With a wireless network, users can connect and work with their own personal devices and can be in any location within the premises.

Wireless network is revolutionary, but it's disadvantages are quite problematic. An increasing wireless cluster can impede network allow. As a device is added to a network, it takes a bandwidth and a more is being add, more bandwidth are taken, choking the media.

A user has to be close to the AP for better transmission and wireless is susceptible to attackers.

4 0
4 years ago
2. (40 POINTS) Assume a 16-word direct mapped cache with b=1 word is given. Also assume that a program running on a computer wit
Fynjy0 [20]

Answer:

See the attached file for the answer.

Explanation:

(a) Find attached of question a.

b. the miss rate for the above instructions address sequence is 100% as no address is repeated.

5 0
3 years ago
Other questions:
  • Let K(x, y) denote the statement "x knows y" and D denote the domain of all people. Express the following English sentences as a
    9·1 answer
  • Alex has started a Google Search campaign designed to promote his online motorcycle accessories store. His store focuses on cust
    6·1 answer
  • After brainstorming engineers may refine their ideas by making
    8·1 answer
  • Which formula best expresses your monthly ending balance?
    12·1 answer
  • "The process was placed in a suspended state by an agent; either itself, a parent process, or the OS, for the purpose of prevent
    10·1 answer
  • if image size and resolution are the same, which file format, .jpg, .gif, .or .tiff, will give you the smallest file size?
    8·2 answers
  • Text can be inserted into a presentation by
    7·1 answer
  • What is the first step to apply the line and page breaks options to groups of paragraphs in a Word document?
    10·2 answers
  • personal digital assistants are handheld devices that serve as personql information managers. what is another term used to refer
    11·2 answers
  • 1. State three types of web protocols​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!