1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
just olya [345]
3 years ago
14

REPORT THIS USER. HE'S SHOWING HIS YK WHAT TO EVERYONE INCLUDING ME. HIS ACCOUNT PROFILE IS IN THE PICTURE BELOW

Computers and Technology
1 answer:
Agata [3.3K]3 years ago
4 0

Answer:

What a disgusting person

Explanation:

You might be interested in
What is the purpose of the backoff on Ethernet networks?
stellarik [79]

Answer: Please see below as the answer is self-explanatory.

Explanation:

In the original Ethernet standard, IEEE 802.3, the method used to deliver packets within a Ethernet network, is called CSMA/CD, and the acronym includes all the Ethernet features in brief.

Let's explain the different parts of the acronym.

CSMA= Carrier Sense Multiple Access.

This means that when any computer in the network (with no privileges for nobody) has a packet to transmit, it first "listen"if the network is idle. If it is the found condition, deliver the packet, and wait for an acknowledgement.

If past a given time, the ACK is not received, assumes that the packet was lost, due to a collision with another packet coming from another computer (this can happen because the packets don't travel instantaneously from one host to another, so one machine could have started to transmit before the another one could sense this fact).

This process is described by the other part of the acronym:

CD = Collission Detection

In order to avoid this type of problem, before trying to resend the packet, it waits some time, which is called "backoff".

This time increases exponentially each time that it is not possible to send a packet successfully, in order to try to find a moment in which finally the network be clear.

8 0
4 years ago
When reading events in the Event Viewer, you need to recognize the designated levels or classifications. Which of the following
Gala2k [10]

Answer:

B. A problem has occurred that might impact functionality that is external to the application or component that triggered the event.

D. An issue has occurred that can impact service or Result in a more serious problem if action is not taken.

Explanation:

C is not an option as the program ran successfully, and hence no warning was triggered.

A. is not an option as the failure occurs, and its impossible to automatically get rid of it. Hence, this is a failure and not a warning.

B and D are definitely a warning. And hence, the above choices. They clearly are situation in which a warning is being given, and the computer program ends with wrong answer, as the functionality is effected.

8 0
3 years ago
I have python homework and I’m struggling with it
melamori03 [73]

Answer:

okay

Explanation:

what's the question

5 0
3 years ago
A ________ is a computer or other electronic device connected to a network
Tanzania [10]
A _node_ is a computer or other electronic device connected to a network.

With the _mesh_ network topology, reliability is the major advantage while high cost is the disadvantage.
8 0
3 years ago
Suppose that the format for license plates in a certain state is two letters followed by four numbers. (a) How many different pl
Ymorist [56]

Answer:

(a) 6,760,000 plates

(b) 3,407,040 plates

(c) 6,084,000 plates

Explanation:

The very first thing to note about this question is the number of characters involved in the license plate format (6 characters in this case; 2 letters and 4 numbers). The letters come first and then the numbers follow.

There are a total of 26 possible letters (A-Z) and 10 possible numbers (0 - 9) that can be chosen. We can then proceed to the first question;

(a) Here, the total number of possible plates is to be determined. This is done as follows:

Character 1 (Letter): There are 26 possible letters

Character 2 (Letter): There are 26 possible letters

Character 3 (number): There are 10 possible numbers

Character 4 (number): There are 10 possible numbers

Character 5 (number): There are 10 possible numbers

Character 6 (number): There are 10 possible numbers

So, total number of different plates will be obtained by multiplying all the possibilities: 26 × 26 × 10 × 10 × 10 × 10 = 6,760,000 plates

(b) This second part puts a constraint on the usage of the numbers, unlike the question (a), where there was no constraint at all.

Since there is no constraint on the letters, we can write that:

Character 1 (Letter): There are 26 possible letters

Character 2 (Letter): There are 26 possible letters

For the first number as well, we can write:

Character 3 (number): There are 10 possible numbers

However, for the remaining characters, the possibilities will continually reduce by a value of 1, since we can not use a number that has been used before. So,

Character 4 (number): There are 9 possible numbers

Character 5 (number): There are 8 possible numbers

Character 6 (number): There are 7 possible numbers

So, total number of different plates will be: 26 × 26 × 10 × 9 × 8 × 7 = 3,407,040 plates

(c) Here, repetitions are allowed as in questions (a), but there can not be four zeros. This implies that the maximum number of zeros in any plate will be three. Thus, there will be maximum possibilities on all characters until the last one which will be constrained.

Character 1 (Letter): There are 26 possible letters

Character 2 (Letter): There are 26 possible letters

Character 3 (number): There are 10 possible numbers

Character 4 (number): There are 10 possible numbers

Character 5 (number): There are 10 possible numbers

Character 6 (number): There are 9 possible numbers

Total number of plates will therefore be: 26 × 26 × 10 × 10 × 10 × 9 = 6,084,000 plates.

7 0
3 years ago
Other questions:
  • Which Command Prompt commands in Windows is used for listing a computer connections to shared resources
    10·1 answer
  • you want to search in your contacts in your email program. You enter the person's first name and last name in the search box. Yo
    8·1 answer
  • What feature should an administrator use to meet these requirements?
    8·1 answer
  • What do you need to know when buying screws<br>​
    12·2 answers
  • Microsoft PowerPoint is popular software that allows you tocreate slides, handouts, notes, and outlines.
    12·1 answer
  • 7.4 code practice question 1 edhesive
    15·2 answers
  • As part of its commitment to sustainability, a company is looking for a way to track the source of purchased goods and how they
    14·2 answers
  • Please help me i’ll give you brainlist
    13·1 answer
  • Cybersquatters:_________.
    5·1 answer
  • Your task is to design a method int[] allMatches(int[] values, int size, int a, int b) that returns all values between a and b i
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!