1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
3 years ago
14

How old is the oldest asian

Computers and Technology
2 answers:
fomenos3 years ago
7 0

Answer:

100000000000000000000000000

Ahat [919]3 years ago
7 0

Answer: 146, born on December 31, 1870.

Explanation:

You might be interested in
Could anyone please answer this?
Anastaziya [24]

Answer:

D

Explanation:

The answer is D because if you're looking for lightweight materials, you'll be dealing with chemistry, and chemistry is sience.

4 0
2 years ago
Convert the following hexadecimal numbers to decimal: (a) FF (b) F0A2 (c) 0F100 (d) 100
Hatshy [7]

Answer:

a) 255

b) 61602

c)

d)

Explanation:

You need to understand the decimal equivalent of hexadecimal numbers, <em>from 0 to 9 numbers are represented the same way, from 10 to 15 we use the alphabet, meaning 10 equals A in hexadecimal base, 11-B, 12-C, 13-D, 14-E, and 15-F.</em>

For your first exercise you'll enumerate the number's positions fromright to lef begining with 0:

a.               F   F

position    1    0

Now you'll multiply your hexadecimal number (using the decimal equivalent for your letters) for the base (16) elevated to the number of the position:

F*16^{0}=15*1=15\\F*16^{1}=15*16=240

Finally, you'll add your results:

240+15=255

FF=255

b.             F  0  A  2

position   3  2  1   0

2*16^{0}=2*1=2\\A*16^{1}=10*16=160\\0*16^{2}=0*256=0\\F*16^{3}=16*4096=61440\\\\2+160+0+61440=61602\\

F0A2=61602

c.             F  1  0  0

position   3  2  1   0

0*16^{0}=0*1=0\\0*16^{1}=0*16=0\\1*16^{2}=1*256=256\\F*16^{3}=16*4096=61440\\0+0+256+61440=61696\\

0F100=61696

d.              1  0  0

position  2  1   0

0*16^{0}=0*1=0\\0*16^{1}=0*16=0\\1*16^{2}=1*256=256\\\\0+0+256=256\\

100=256

I hope you find this information useful! Good luck!

8 0
3 years ago
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
3 years ago
Given an array arr, of type int, along with two int variables i and j, write some code that swaps the values of arr[i] and arr[j
Inessa05 [86]

You'll need a helper variable for this, so depending on your programming language, the solution becomes:

int helper;

helper = arr[i];

arr[i] = arr[j];

arr[j] = helper;

3 0
2 years ago
What do you setup when you want to filter traffic from getting through a firewall?
Andreyy89

Explanation:

Windows Firewall

Windows Firewall is a packet filter and stateful host-based firewall that allows or blocks network traffic according to the configuration. A packet filter protects the computer by using an access control list (ACL), which specifies which packets are allowed through the firewall based on IP address and protocol (specifically the port number). A stateful firewall monitors the state of active connections and uses the information gained to determine which network packets are allowed through the firewall. Typically, if the user starts communicating with an outside computer, it remembers the conversation and allows the appropriate packets back in. If an outside computer tries to start communicating with a computer protected by a stateful firewall, those packets are dropped automatically unless access was granted by the ACL.

6 0
2 years ago
Other questions:
  • Wendy Patel is entering college and plans to take the necessary classes to obtain a degree in architecture. Research the program
    12·1 answer
  • You use a(n) ____ variation when a use case is less specific than others, and you want to be able to substitute the more specifi
    8·1 answer
  • You have a multi-domain Windows Server 2008 forest. You need to make a shared folder available to users from several domains. Wh
    9·1 answer
  • Give an example of an outdated memory or storage device what do you think they are outdated
    12·1 answer
  • You have added a table to your web page consisting of two columns and five rows, including the header row. in the first header c
    13·1 answer
  • A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employe
    12·1 answer
  • ____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random in
    6·1 answer
  • Explain the history of computing device of mechanical era
    7·1 answer
  • A screen capture is a digital image of your screen, as if you took a picture of it with a camera. For instance, you might want t
    15·1 answer
  • One of the most notable impacts of IT on business is improved
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!