1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
6

What is local technology ? give examples​

Computers and Technology
1 answer:
8090 [49]3 years ago
7 0

Answer:

the technologynwhich is used in our locality os calleg local technology

ex. biogas farm , modern methods of 1transport etc

You might be interested in
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
2 years ago
Can someone please explain binary addition to me? i have a test tomorrow yikes
umka2103 [35]

Answer:

its easy

Explanation:

there are are 5 main rules

in binary there are 2 number 0 and 1

0 + 0 = 0

0 + 1 = 1

1+0=1

1+1=0 carry 1

e . g

1 1 1

1 0 1 0 1 0

+ 1 1 0 0 1 0

-------------------------

1 1 1 1 1 0 0

*in bold are the ones that you need to carry.

in decimal there are 10 possible numbers 0- 9

when you do 1 + 9 it becomes 10, this can be done easily, however if you do 1 + 9 in a table like above, you will get 0 for the first column and you will carry 1 to the next column .

in binary is the same idea but using on 2 numbers 1 and 0

e.g

1

1

+ 9

----------

1 0

*in bold are the ones that you need to carry.

hope it helps and good luck in your exam.

3 0
3 years ago
Cite los botones de edición que existen y determine en que ficha y grupo se encuentran.
Alina [70]

Answer:

GHRUDIFDSFHEOUSDHFHESDHFHEFE

Explanation:

SORRY I DONT KNOW

5 0
3 years ago
PLEASE HELP, THANK YOU SO MUCH!
ozzi

Answer:

The correct answer is "Once a day".

Explanation:

According to social media marketing, it is a good idea to check your reader at least once a day. Readers help business by tracking what the consumers are seeing and what times of the day. Checking the reader at least once a day help people in marketing to be updated, because people's preference keep changing all the time.

3 0
3 years ago
Epic is fuzzy-figure8
prohojiy [21]

Answer:

Mine is Chachee_girl if u wanna play

8 0
2 years ago
Read 2 more answers
Other questions:
  • Distinguish between engineering and architecture​
    5·1 answer
  • Q1: what is significant about the contents of the destination address field?
    12·2 answers
  • The first time you save a document, which screen appears
    8·2 answers
  • Productivity can best be described as:
    5·2 answers
  • You are part of a team that is setting up a movie streaming service. The company is planning on initially making available 500 m
    9·1 answer
  • In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processe
    8·1 answer
  • Brian has been working for a few years now and has saved a substantial amount of money. He now wants to invest 50 percent of his
    12·2 answers
  • What is the output?
    12·1 answer
  • Different between input and output device​
    5·1 answer
  • Even though jdoe and jrock have the same password (i.e., hacker), their password hashes in the /etc/shadow file are different. W
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!