1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rjkz [21]
3 years ago
14

Who do you guys ship lol bit with?

Computers and Technology
2 answers:
LekaFEV [45]3 years ago
8 0

Answer:

nobody

Explanation:

Daniel [21]3 years ago
3 0
I don't know who bit but I like shipping Gogy and Dream
You might be interested in
A USB flash drive uses solid
steposvetlana [31]
State drive. SSD=Solid State Drive
8 0
3 years ago
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open o
In-s [12.5K]

Answer:

False.

Explanation:

Administrators showing caution in using the same tools that are used by the attackers remember that tool that can help to close a poorly configured or open firewall will help network defender and it will minimize the risk from the attack.

Hence the answer to this question is false.

6 0
3 years ago
In this technique, each attribute is associated with a specific feature of a face, and the attribute value is used to determinet
s344n2d4d5 [400]

Answer:

Chernoff faces.

Explanation:

Chernoff faces is a data visualization technique that was developed by a statistician named Herman Chernoff. He introduced this data visualization technique to the world in 1973 to represent multivariate or multidimensional data containing at least eighteen (18) variables.

In Chernoff faces, each attribute is associated with a specific feature of a face (nose, eyes, ears, hair, mouth, and eyebrows), and the attribute value with respect to size, shape, orientation, colour and placement is used to determine the way a facial feature is expressed.

The Chernoff face is a technique designed and developed to help detect similarities between different items and discern subtle changes in facial expressions from the perspective of an observer.

6 0
3 years ago
System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
kap26 [50]

Answer:

-32 to +31

Explanation:

6 bit 2s complement representation will be of the form b1b2b3b4b5b6 where each bit is either 0 or 1.

The largest positive number that can be represented using this scheme is 011111

Translating this to decimal this is 1*2^4 + 1^2^3 + 1^2^2 + 1^2^1 + 1^2^0

=16 + 8 + 4 + 2 + 1 =31

The smallest negative number that can be represented using this scheme is 100000

Translating this to decimal = -1 * 2^5 = -32

So the range of decimal values that can be represented is -32 to +31.

6 0
3 years ago
Question 19 :A user needs the video capability in his computer upgraded to support a new graphics application. The computer incl
elena-s [515]

Answer:

The onboard video card should be disabled in the BIOS. After you disable the onboard video card in the BIOS, it will no longer function.

Explanation:

Since in the question a user wants to upgrade for new graphics application and also the computer involves the onboard video card and a new video card is installed in the computer now you want to disabled it

So this can be done in the BIOS i.e basic input output system which is to be used for rebooting the computer system

And after disabled it, you cannot used.

3 0
3 years ago
Other questions:
  • You have recently implemented a new WAN technology to connect a remote branch office to your headquarters. While making VoIP cal
    15·1 answer
  • What does confidentiality of data refer to?
    6·2 answers
  • What must you specify the first time you save a new document? * 10 points a) file name b) file type c) file location d) all of t
    12·1 answer
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • Fill the validateForm function to check that the phone number contains a number (use the isNaN function) and that the user name
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·2 answers
  • Please!! I need help, this is due by tonight!!!
    11·1 answer
  • Which of these exemplifies an iterative process
    15·2 answers
  • 8. Cloud Storage is
    5·2 answers
  • Moving images of real event​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!