1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
8

Instructions

Computers and Technology
1 answer:
Charra [1.4K]3 years ago
3 0

Answer:

The answer is below

Explanation:

Given that there are no specific options here. Here are some of the most common port types in order of their speed capability from lowest to highest.

In Bytes and Bits per second, that is:

1. USB 1.1 = 1.5 MB/s - 12Mbit/s

2. Firefire 400 = 50 MB/s - 400Mbit/s

3. USB 2.0 = 60 MB/s - 480Mbit/s

4. FireWire 800 = 100 MB/s - 800Mbit/s

5. USB 3.0 = 625 MB/s - 5Gbit/s

6. eSATA = 750 MB/s - 6Gbit/s

7. USB 3.1 = 1.21 GB/s. - 10Gbit/s

8. Thunderbolt = 1.25 GB/s * 2 (2 channels) - 10Gbit/s * 2 (2 channels)

9. Thunderbolt 2 = 2.5 GB/s - 20Gbit/s

10. Thunderbolt 3 = 5 GB/s - 40Gbit/s

You might be interested in
Write two statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a slash, and
Montano1993 [528]

Answer:

1/2000

Explanation:

import java.util.Scanner;

public class InputExample {

public static void main(String [] args) {

Scanner scnr = new Scanner(System.in);

System.out.print("Enter birth month and date:");//comment this line if not needed

int birthMonth=scnr.nextInt();

int birthYear=scnr.nextInt();

String output= birthMonth+"/"+birthYear+"\n";

System.out.println(output);

}

}

if using this code the out put should be 1/2000

5 0
3 years ago
When students have computer trouble they usually are expected to
Kitty [74]

Answer: A) Make any simple fixes on their own.

5 0
3 years ago
Read 2 more answers
_____ is a protocol used by e-mail clients to download e-mails to your computer.
navik [9.2K]
Smtp : Simple Mail Transfer Protocol
3 0
3 years ago
What is an implicit benefit to Monetary Policy?
Mariana [72]
The answer to your question is a
6 0
4 years ago
Anna discovers malware on her computer. After being downloaded, the malware self-activated and replicated itself and infected th
Tresset [83]

Answer:

A.

Explanation:

The malware that replicates itself and can infect the entire system is a worm.

A worm is a type of malware that gets self-activated and replicated. This worm spreads rapidly over the computer system and can corrupt all the files and the entire system.

A worm is a standalone application and does not require action from humans.

Therefore, option A is correct.

6 0
3 years ago
Other questions:
  • Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
    5·1 answer
  • 10 facts about turbines
    11·2 answers
  • Which collaboration website is best suited for social collaboration? www.media.iearn.org/projects www.meetup.com www.quest.nasa.
    9·1 answer
  • What is the most important for you to choose before you build a network?
    7·1 answer
  • What is the root of the tree?
    6·1 answer
  • What is the web of trust
    7·2 answers
  • Help me please! (*18* points!)
    5·1 answer
  • Challenge activity 1.11.1: using constant in expression is not working for me. Can any one help me find the right code?
    12·1 answer
  • Which era marked a switch from agricultural practices to industrial practices?
    6·1 answer
  • Question 1 Fill in the blank: Internet search engines are an everyday example of how Boolean operators are used. The Boolean ope
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!