1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
3 years ago
12

Cuales son los multiplos de un byte

Computers and Technology
1 answer:
GalinKa [24]3 years ago
8 0

Answer:

I hope this works for u

Explanation:

1 GIGABYTE = 1Gb = 1024 Mb = 1.000.000.000 bytes. 1 TERABYTE = 1Tb = 1024 Gb = 1 billon de bytes. 1 PETABYTE = 1Pb = 1024 Tb = Mill billones de bytes. 1 EXABYTE = 1 Eb = 1024 Pb = 1 trillon de bytes.

Can I have a brainliest..

Puedo tener un brainliest

Plz :3

You might be interested in
When you set up social connections, each generic icon in the contacts list and the People Pane will be replaced with the profile
Annette [7]

Answer:

True.

Explanation:

When you established social links, your social media site profile may eliminate almost any generic symbol throughout the list of contacts and the Individuals Pane with profile pic the contact may have placed. Thus, the Users Pane would be exchanged with profile image of the contact while establishing the social connections.

6 0
2 years ago
A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
balu736 [363]

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

7 0
2 years ago
How can you add more bytes to your iPad if there isn't enough storage space?
miv72 [106K]
You cant, you have to either delete items off to gain some storage back or go buy an ipad with more storage
3 0
3 years ago
Read 2 more answers
im try to search for question the search bar and is giving me a error message is the page having any technical problem?
aalyn [17]
I have been running into the same problem, they haven't said anything but that might be the case.
6 0
3 years ago
Terry is building a Web site and wants to have three main links called Home, Product Info, and Contact Us. She will create a hie
Shalnov [3]

Answer: Child element

Explanation:

 According to the question, terry building the web site and she wants to create the three main types of links in the home page such as home, contact us and the product information. The, she start creating the hierarchy of elements in the page and also revise all the styles in the sheet.

Then, the home page contain the two child element as it s the sub elements of the home page. As, the one element which is inherited from the upper element ( Parent ) is known as child element. This is the hierarchy of the elements which represented in the home page.  

5 0
3 years ago
Other questions:
  • Your new home has a vacuum system. what kind of computer is controlling it?
    5·1 answer
  • "under the control panel, what console contains print management, computer management, and event viewer?"
    11·1 answer
  • What are the names of the 3 main languages used for making websites
    10·1 answer
  • What power brake uses vacuum from the engine to aid in brake application?
    6·2 answers
  • -Which of the following is true about Web services?
    10·1 answer
  • Which of the following is non-volatile storage?
    6·1 answer
  • Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​
    15·2 answers
  • What goals do you set for yourself while studying?
    9·2 answers
  • PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!<br><br><br>​
    9·1 answer
  • in the topology configuration, hosts are connected to each other through a central controller which assumes all responsibility f
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!