1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
13

Storage that is wiped clean when power is cut off from a device is known as _____.

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
4 0
<span>Volatile. An example would be RAM.</span>
You might be interested in
1. Assume you're using a three-button mouse. To access shortcut menus, you would
Leni [432]
Right click! It seems easy enough but, I'm required to put 20 characters =/
5 0
3 years ago
Read 2 more answers
What is a alt key and how does it work
Sever21 [200]
A key on a keyboard that when pressed at the same time as another key gives the second key an alternative function.
4 0
4 years ago
Read 2 more answers
A router has just received the following new IP addresses: 88.62.108.0/21, 88.62.116.0/21, 88.62.120.0/21 and 88.62.128.0/21. If
Natali [406]

Answer:

Yes, they can be aggregated into a single network address of 88.62.0.0/16

Explanation:

Since they all will be using the same outgoing interface so they can be grouped according to next hop which appears to be the same for all four IP address.

First convert all the network addresses into binary.

DECIMAL                      BINARY                                                      CLASS OF IP

88.62.108.0/21            01011000.00111110.01101100.00000000      Class A

88.62.116.0/21             01011000.00111110.01110100.00000000     Class A

88.62.120.0/21            01011000.00111110.01111000.00000000     Class A

88.62.128.0/21           01011000.00111110.10000000.00000000    class A

Looking at the binary form of the address from left to right it can be observed that all for address are identical in the first two octet, that is up to the 16th digit.

So the new subnet mask will be /16, using any of the four address and the /16 mask will can obtain the new network address

All four address can be summarized as 88.62.0.0/16

4 0
3 years ago
If you selected row 17 and then selected Insert Sheet Rows, row 17 _____.
solniwko [45]

Answer:

that answer is a and all that is the math

4 0
3 years ago
token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle netw
ikadub [295]

Given that,

Token is 64 bytes long

The average number of stations that the token must pass = 20

We need to calculate the transmission delay for token

Using formula of transmission delay

Transmission\ delay=\dfrac{token\ size}{minimum\ size}

Put the value into the formula

Transmission\ delay=\dfrac{64\ bytes}{10\ Mbps}

Transmission\ delay=\dfrac{64\times8}{10\times10^6}

Transmission\ delay=0.0000512\ sec

Transmission\ delay=5.12\times10^{-5}\ sec

We need to calculate the average wait to receive token on an idle network with 40 stations

Using formula of average wait

\text{average wait to receive token}=\text{average number of stations that the token must pass}\times transmission\ delay

Put the value into the formula

\text{average wait to receive token}=20\times5.12\times10^{-5}

\text{average wait to receive token}= 0.001024\ sec

\text{average wait to receive token}= 1.024\ ms

Hence, The average wait to receive token on an idle network with 40 stations is 1.024 ms.

8 0
4 years ago
Other questions:
  • What's the problem with this code ?
    14·1 answer
  • Maia notices that her paragraphs are too close to one another. She wants to increase the space. Which arrangement of steps does
    6·2 answers
  • Examine the following declarations and definitions for the array-based implementations for the Stack and Queue ADTs. Assume that
    14·1 answer
  • 8. _______ are used to store all the data in a database.
    7·2 answers
  • Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
    5·1 answer
  • Which statement best compares routers and hubs?
    9·1 answer
  • Is the address 7b invalid regarding cell references?
    8·1 answer
  • Read the Python program below: num1 = int(input()) num2 = 10 + num1 * 2 print(num2) num1 = 20 print(num1) Question 1 When this p
    6·1 answer
  • 1. Harold Worden, then 56-years-old, stole Kodak property
    9·1 answer
  • Fortnight on sat 530-10 my name is TTV BTW laggking_12
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!