1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
3 years ago
5

Write down a pair of integers whose sum is​ 0

Computers and Technology
1 answer:
Tems11 [23]3 years ago
3 0

Answer:

-1 ans +2 are the pair of integers whose sum is 0.

You might be interested in
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
2 years ago
Consider a system which has a memory access time of 300 nsec. An average page fault takes around 10 millisecond to get serviced.
vladimir1956 [14]

Answer 72 ncs is the answer im pretty sure

8 0
2 years ago
Read 2 more answers
4. A friend knows you are taking a technology class in college and asks you how a hard drive works. In your own words, describe
sveticcg [70]
Keep it simple... it holds whatever info' you want. would he/she understand?


3 0
2 years ago
Read 2 more answers
Consider sending a 1,600-byte datagram into a link that has an mtu of 500 bytes. suppose the original datagram is stamped with t
dsp73

Explanation:

Step one

The maximum size of data field in each fragment = 480

(because there are 20 bytes IP header) Thus the number of required

fragments  =\frac{1600-20}{480} \\\\= \frac{1580}{480} \\\\=3.29\\\\

thus the number of required fragment is 4

Step two

Each fragment will have identification number 291. each fragment except the last one will be of size 500 bytes (including IP header). the offset of the fragments will be 0, 60, 120, 180. each of the first 3 fragments will have

flag = 1; the last fragment will have flag =0

6 0
3 years ago
An increase in pay because of how well you do a job is called _____.
sleet_krkn [62]
It's either a raise or a promotion.
4 0
3 years ago
Read 2 more answers
Other questions:
  • How do you create a reference page in apa format with all websites?
    5·1 answer
  • If num is an int which expression always evaluates to true if num holds an odd number
    14·1 answer
  • Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols
    5·1 answer
  • What is a set of javascript statements that result in an action?
    15·1 answer
  • In one to two sentences, explain why citizens pay taxes
    8·1 answer
  • What is sun and what does it do?
    12·2 answers
  • You are utilizing BitLocker Drive Encryption, and are attempting to update Windows Server 2016. What must be done so that the up
    14·1 answer
  • Difference between Computer safety practices and precautions
    6·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
  • Exam Instructions
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!