1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tpy6a [65]
3 years ago
6

Jobs of hardware engineers ​

Computers and Technology
1 answer:
amid [387]3 years ago
8 0

Answer:

Computer hardware engineers oversee the manufacture, installation, and testing of computer systems, servers, chips, and circuit boards. They work with peripherals including keyboards, routers, and printers. Another title for this occupation is hardware engineer. Approximately 73,600 computer hardware engineers worked in the U.S. in 2016.

Explanation:

hope this helped!

can i have brainliest?

You might be interested in
Eu fui pegar meu ChormeBook(é tipo uma versão de notebook) e aí eu acenei forçando um pouco a tela com o polegar e deu nisso, eu
Aliun [14]

Answer:

It's not good in reality to touch the Chromebook's screen with your finger, a pencil, a pen or anything like your thumb. They might start looking blurred or if you touch them very hard then they might crack as well. If this happens, report to the authorized store immediately, and if warranty prevails you will get it repaired at no extra cost. However, take this as a warning, and keep in mind the precautions mentioned in the explanation.

Explanation:

Never put extra pressure on the Chromebook screen, and even when it is not open.

Always store it in a closed position.

Always keep the things that can put pressure away from your Chromebook.

Never poke your screen with something that put a mark or a kind of scratch on the surface of the screen.

Never ever, place something on the keyboard like pens, disks or pencils prior to shutting the lid.

5 0
4 years ago
You have a network with a subnet of 172.16.17.0/22. Which of the following is a valid host address?A. 172.16.17.1 255.255.255.25
Licemer1 [7]

Answer:

E. 172.16.18.255 255.255.252.0

Explanation:

Oh goodie, this is my home turf.

The answer is E) 172.16.18.255 255.255.252.0

This is because your subnet network ID includes mask \22, which means the ending with 255 255.255.252.0, which is standard for Class B. Only option E falls as an adequate host due to the network being 172.16.16 and broadcasting 16.19.

7 0
3 years ago
Dr. Watson has been kidnaped! Sherlock Holmes was contacted by the kidnapper for ransom. Moments later he received a message fro
adelina 88 [10]

Answer:

please mark me brainlist

Explanation:

This algorithm works for n number of strings in python3

Input:

83217

8213897

683147

Output:

837

from itertools import product

import pdb

import numpy as np

def neigh(index):

N = len(index)

for ri in product((0, -1), repeat=N):

if not all(i == 0 for i in ri):

yield tuple(i + i_rel for i, i_rel in zip(index, ri))

def longestCommonSubSequenceOfN(sqs):

numberOfSequences = len(sqs); # to know number of sequences

lengths = np.array([len(sequence) for sequence in sqs]); # to know length of each sequences placed in # array

incrLengths = lengths + 1; # here we are taking no .of sequences +1

lengths = tuple(lengths); # making lengths into tuple to make it mutable

inverseDistances = np.zeros(incrLengths);

ranges = [tuple(range(1, length+1)) for length in lengths[::-1]]; # finding ranges from 1 to each lengths

for tupleIndex in product(*ranges):

tupleIndex = tupleIndex[::-1];

neighborIndexes = list(neigh(tupleIndex)); # finding neighbours for each tupled index value and # store them in list

operationsWithMisMatch = np.array([]); # creating array which are miss matched

 

for neighborIndex in neighborIndexes:

operationsWithMisMatch = np.append(operationsWithMisMatch, inverseDistances[neighborIndex]);

#appending newly created array with operations miss match and inverseDistances

operationsWithMatch = np.copy(operationsWithMisMatch);

# copying newly generated missmatch indexs

operationsWithMatch[-1] = operationsWithMatch[-1] + 1;

# incrementing last indexed value

chars = [sqs[i][neighborIndexes[-1][i]] for i in range(numberOfSequences)];

# finding a string(chars) with neighbour indexes and checking with other sequences

if(all(elem == chars[0] for elem in chars)):

inverseDistances[tupleIndex] = max(operationsWithMatch);

else:

inverseDistances[tupleIndex] = max(operationsWithMisMatch);

 

subString = ""; # resulted string

mainTupleIndex = lengths; # copying lengths list to mainTupleIndex

while(all(ind > 0 for ind in mainTupleIndex)):

neighborsIndexes = list(neigh(mainTupleIndex));

#generating neighbour indexes with main tuple index in form of list

anyOperation = False;

for tupleIndex in neighborsIndexes:

current = inverseDistances[mainTupleIndex];

if(current == inverseDistances[tupleIndex]): # comparing indexes in main tuple index and inverse #distance tuple index

mainTupleIndex = tupleIndex;

anyOperation = True;

break;

if(not anyOperation): # if anyoperation is False then we are generating sunString

subString += str(sqs[0][mainTupleIndex[0] - 1]);

mainTupleIndex = neighborsIndexes[-1];

return subString[::-1]; # reversing resulted string

sequences = ["83217", "8213897", "683147"]

print(longestCommonSubSequenceOfN(sequences)); #837

8 0
3 years ago
Consider a distributed denial of service (DDOS) attack, Assume the attacker has compromised a number of broadband connected comp
Daniel [21]

Answer:

A ) 200 Zombie systems

B ) 200 Zombie systems

Explanation:

maximum uplink data rate : 512 kbps = 512 * 1000 * 8  = 4096000 bits/sec

Determine the number of 512 byte  ICMP echo packets = 512 * 8 = 4096 bits

hence the maximum number of 512-byte ICMP echo request (ping) packets a single zombie computer can send per second = 400 packets/sec

i.e. for 512kbps = 400 packets/sec

Determine the number of Zombie systems that the attacker will need to flood a target server

A) For a fast ethernet

A fast ethernet = 100 mbps

The number of Zombie systems needed = 1 zombie system * 200

and 1 zombie system = 512 kbps

therefore for a Fast ethernet the number of zombies systems needed = 200

B) For A Gigabit Ethernet

same as a fast ethernet system i.e. = 200

4 0
3 years ago
_________ was demilitarized by Germany because of the Treaty of Versailles. The Rhineland The North Sea The Ruhr Valley Eastern
Alchen [17]

The Rhineland was turned into a demilitarized zone because of the Versailles Treaty.   -From 1919, Germany wanted to get rid of this zone because it left them open to attack from Belgium, Holland and France.   In March 1936, Germany's army occupied the Rhineland.

8 0
3 years ago
Read 2 more answers
Other questions:
  • _____ is published by the U.S. Bureau of Labor Statistics. It provides up-to-date career outlook information. It is no longer av
    15·2 answers
  • Question 4 (4 points)
    8·1 answer
  • The______for our newest game keeps changing as we develop our concept and refine our goals.
    11·2 answers
  • Use of the Internet for recruiting is: a. popular with job seekers, but not recruiters. b. the most commonly used search tactic
    5·1 answer
  • In PumaMart system, why an initial offer is not necessary at the beginning of negotiation?
    6·1 answer
  • Teachers can organize the classroom environment to facilitate activities and to prevent problems. True Or False
    15·1 answer
  • Explain default dictionary in microsoft word​
    9·1 answer
  • I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding
    8·2 answers
  • Route summarization means to make several smaller networks appear as
    6·1 answer
  • How to ignore punctuation before and after a word javascript
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!