1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
12

2. Answer any

Computers and Technology
1 answer:
lozanna [386]3 years ago
8 0

Answer:

C

Explanation:

martin luther kings speech is being restated in todays current events in the BLM protests because martin luther king was basically fighting for black peoples rights and the 14th and 15th amendments were supposed to help black peoples rights and freedom but today people aret following that because of police violence/brutality

You might be interested in
Which tab is used to insert a hyperlink onto a slide
Roman55 [17]
The tab used to instead a Hyperlink into a slide is the Insert tab under the “Links” group.
5 0
3 years ago
Read 2 more answers
Is this free? do i have to pay to use this app??
Virty [35]
No i don’t have to pay but there is additional stuff if you pay but i don’t pay for anything
3 0
3 years ago
You share a number of files from your computer, and you've received a number of calls from users who say they can't connect to t
zmey [24]

Answer:

ifconfig p2s1 down ifdown enp2s1 ip link set enp2s1 down

Explanation:

It can be used to enable or disable a network port interface in Linux. It involves 5 methods which are.

A.) ifconfig command. Is adopted in configuring a network interface, it gives info about NIC

B.) ifdown/if up command. Used to bring down or bring up a network interface.

C.) ip command. Used in managing NIC

D.) nmc1i command

It is a line tool that controls network manager and is also used in describing the status of a network.

E.) nmtui command

4 0
3 years ago
Is white 444 a hacker​
anastassius [24]

Answer:

WHITE 444 playing like a Hacker in Rank Game in Indian Server ||All are say Hacker|| Freefire · Raman Gamer.

Explanation:

boogers

3 0
3 years ago
Consider a single-platter disk with the following parameters: rotation speed: 7200 rpm; number of tracks on one side ofplatter:
horsena [70]

Answer:

Given Data:

Rotation Speed = 7200 rpm

No. of tracks on one side of platter = 30000

No. of sectors per track = 600

Seek time for every 100 track traversed = 1 ms

To find:

Average Seek Time.

Average Rotational Latency.

Transfer time for a sector.

Total Average time to satisfy a request.

Explanation:

a) As given, the disk head starts at track 0. At this point the seek time is 0.

Seek time is time to traverse from 0 to 29999 tracks (it makes 30000)

Average Seek Time is the time taken by the head to move from one track to another/2

29999 / 2 = 14999.5 ms

As the seek time is one ms for every hundred tracks traversed.  So the seek time for 29,999 tracks traversed is

14999.5 / 100 = 149.995 ms

b) The rotations per minute are 7200

1 min = 60 sec

7200 / 60 = 120 rotations / sec

Rotational delay is the inverses of this. So

1 / 120 = 0.00833 sec

          = 0.00833 * 100

          = 0.833 ms

So there is  1 rotation is at every 0.833 ms

Average Rotational latency is one half the amount of time taken by disk to make one revolution or complete 1 rotation.

So average rotational latency is: 1 / 2r

8.333 / 2 = 4.165 ms

c) No. of sectors per track = 600

Time for one disk rotation = 0.833 ms

So transfer time for a sector is: one disk revolution time / number of sectors

8.333 / 600 = 0.01388 ms = 13.88 μs

d)  Total average time to satisfy a request is calculated as :

Average seek time + Average rotational latency + Transfer time for a sector

= 149.99 ms + 4.165 ms + 0.01388 ms

= 154.168 ms

4 0
3 years ago
Other questions:
  • Lucky Sevens. Given a whole number, compute and display how many digits in the number are 7s. For example, the number of 7s in 3
    8·1 answer
  • Write a program that will open the file random.txt and calculate and display the following: A. The number of numbers in the file
    12·1 answer
  • The ____ algorithm was the first public key encryption algorithm developed (in 1977 and published for commercial use.
    8·1 answer
  • In excel, which symbol means not equal to when comparing two values?
    15·1 answer
  • ____ 59. Suppose that x and y are int variables, ch is a char variable, and the input is: 4 2 A 12 Choose the values of x, y, an
    7·2 answers
  • What dynamic would best describe the genre of rock and roll?
    10·1 answer
  • What are the two types of formulas in excel
    9·1 answer
  • Write a program that will open a file named thisFile.txt and write every other line into the file thatFile.txt. Assume the input
    7·1 answer
  • Question Mode Matching Question Match the following description with the appropriate programming language generation. 1GL 1GL dr
    7·1 answer
  • Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enou
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!