1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balu736 [363]
3 years ago
14

A(n) _______ gate provides an output of 1 if either or both inputs are 1.

Computers and Technology
2 answers:
Furkat [3]3 years ago
6 0

Answer:

the last one maybe sorry if its incorrect

padilas [110]3 years ago
5 0
The believe the answer is D(hand)
You might be interested in
material systems developer typically combines the skills of a programmer with the multitasking expectations of a .
SpyIntel [72]

Explanation:

Material systems developer typically combines the skills of a programmer with the multitasking expectations of developing 3 dimensional models of objects, enhancing the graphical effects.

The programmer simply does not have to translate the image but he needs to map the objects in some different ways that give it a 3D look. The object is composed of from material instead of simple modeling

8 0
3 years ago
Which is an internet service?<br><br> Antivirus<br> Chat<br> Firewall<br> Router
leva [86]

Answer:

Router

Explanation:

The others are not related to internet per se.

8 0
4 years ago
Read 2 more answers
How many voltage values can be represented with a 10-bit binary code?
viktelen [127]
Answer is D. 1024
8 bits is enough to represent 256 different numbers. 9 bits is enough to represent 512 numbers. 10 bits can represent 1024 numbers.
8 0
3 years ago
The IT department at Piggy Parts BBQ has recently learned of phishing attempts that rely on social engineering to break into its
Katen [24]

Answer:

all personnel

Explanation:

According to my research on information technology and cyber security, I can say that based on the information provided within the question this information should be communicated to all personnel. This should be done as a safety precaution, by making all personnel aware of they would know to speak up if they see anything suspicious otherwise they might think an attack is just part of something that the organization is implementing.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Suppose that we time three functions in Python: linear searching, binary searching, and sorting. We determine their running time
Igoryamba

Answer:

134

Explanation:

because 6.00×10-9 =51 and 1.80×10-8=10 and 8.00×10-7=73 by adding them it will give the answer out by the figuer 134

6 0
3 years ago
Other questions:
  • Sera ético cargar a la www un vídeo que no es de su propiedad
    15·1 answer
  • In a token ring system, how quickly is the token passed around the circuit? 50 times per second millions of times per second hun
    11·1 answer
  • Write the definition of a function divide that takes four arguments and returns no value . The first two arguments are of type i
    8·1 answer
  • What is the main function of the motherboard?
    12·1 answer
  • All web traffic is based on the ____________________ protocol.
    14·1 answer
  • In real-world environments, risks and their direct consequences will most likely span across several domains. However, in the la
    12·1 answer
  • A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected wi
    14·1 answer
  • What method of technical drawing uses converging lines?
    7·1 answer
  • With software prefetching, it is important to be careful to have the prefetches occur in time for use but also to minimize the n
    8·1 answer
  • The software/system that helps make sure the retail firm doesn't have a stockout is?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!