1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
4 years ago
8

You want to find the distance between two points.

Computers and Technology
1 answer:
maks197457 [2]4 years ago
5 0

Answer:

For the first picture, choose the second pair, and for the second one, choose the first pair

Explanation:

You might be interested in
Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
steposvetlana [31]

Answer:

Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.

High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.

So,Yes bit stuffing is necessary in control field.

7 0
4 years ago
Create a script to input 2 numbers from the user. The script will then ask the user to perform a numerical calculation of additi
ohaa [14]

Answer:

The code given is written in C++

First we declare the variables to be used during the execution. The names given are self-explanatory.

Then the program outputs a request on the screen and waits for user input, for both numbers and one more time for the math operation wanted, selected with numbers 1 to 4.

Finally, the program executes the operation selected and outputs the result on screen.  

Code:

<em>#include <iostream> </em>

<em> int main() </em>

<em>{ </em>

<em> // variable declaration </em>

<em> float numberA; </em>

<em> float numberB; </em>

<em> int operation; </em>

<em> float result=0; </em>

<em> </em>

<em> //number request </em>

<em> std::cout<<"Type first number:\n"; std::cin>>numberA; </em>

<em> std::cout<<"Type second number:\n"; std::cin>>numberB; </em>

<em>  </em>

<em> //Operation selection </em>

<em> cout << "Select an operation\n"; </em>

<em> cout << "(1) Addition\n"; </em>

<em> cout << "(2) Subtraction\n"; </em>

<em> cout << "(3) Multiplication\n"; </em>

<em> cout << "(4) Division\n"; </em>

<em> std::cout<<"Operation:\n"; std::cin>>operation; </em>

<em> </em>

<em> switch(operation){ </em>

<em>  case 1: </em>

<em>   result = numberA+numberB; </em>

<em>   break; </em>

<em>  case 2: </em>

<em>   result = numberA-numberB; </em>

<em>   break; </em>

<em>  case 3: </em>

<em>   result = numberA*numberB; </em>

<em>   break; </em>

<em>  case 4: </em>

<em>   result = numberA/numberB; </em>

<em>   break;    </em>

<em>  default: </em>

<em>   std::cout<<"Incorrect option\n"; </em>

<em>  }</em>

<em> //Show result </em>

<em> std::cout<<"Result is:"<<result<<::std::endl; </em>

<em> return 0; </em>

<em>}</em>

5 0
3 years ago
What does a companys code of ethics cover
never [62]

Answer:

A code of ethics and professional conduct outlines the ethical principles that govern decisions and behavior at a company or organization. They give general outlines of how employees should behave, as well as specific guidance for handling issues like harassment, safety, and conflicts of interest.

7 0
2 years ago
Question 1:
RideAnS [48]

Answer:

1. A

2. B

3. C

hope this helps in some way

6 0
3 years ago
Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: Slow
coldgirl [10]

Answer:

d. Backdoor

Explanation:

A backdoor is a type of malware that overrides security checks and authentications to access a computer or embedded device.

When this is done, remote access is granted and databases and servers can be accessed and modified. Attackers can also give remote commands to the system.

What happened to Ann in the payroll department is probably a backdoor attack that affected her device.

8 0
3 years ago
Other questions:
  • You want to arrange 6 of your favorite CD's along a shelf. How many different ways can you arrange the CD's assuming that the or
    15·1 answer
  • To quickly jump to the last cell in a worksheet press ____.
    15·1 answer
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    9·1 answer
  • What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?
    11·1 answer
  • The file format that an application can always open a named collection of data on a storage medium such as a hard disk or usb fl
    13·1 answer
  • A domain name is used to: *
    15·1 answer
  • What are cell phones used for?
    8·2 answers
  • What are the advantages of knowing demographics over psychographics and vice versa?
    12·1 answer
  • Can you please help me?
    6·1 answer
  • What are all the Answer Streaks (Fun Facts) for brainly?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!