1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatuchka [14]
3 years ago
13

Question # 6

Computers and Technology
1 answer:
insens350 [35]3 years ago
4 0

Answer:

April 30, 1993

Explanation:

On April 30, 1993, four years after publishing a proposal for “an idea of linked information systems,” computer scientist Tim Berners-Lee released the source code for the world’s first web browser and editor.

You might be interested in
When you print ____, the presentation is printed with one or more slides on each piece of paper?
Artist 52 [7]
When you print handouts, the presentation is printed with one or more slides on each piece of paper. When you print handouts, it's best to have the presentation printed on them for those who can not view the presentation clearly to follow along with. This also serves as a great tool for people who missed the presentation to receive a handout later or for those there to take home and review. 
8 0
3 years ago
____ twisted pair is the least quality twisted pair wire that should be used in a data/voice application.
xxMikexx [17]

Answer:

Category 5 (Cat 5) twisted pair is the least quality twisted pair wire that should be used.

Explanation:

The reason is as follows:

  1. Category 1 twisted pair is not suitable for transmitting data but comes in handy for telephone communications. Hence, it should not be used in a data/voice application.
  2. Category 2 twisted pair is suitable for data transmission, however, it can only transmit at 4Mbps which is very slow. Hence, it should not be used in a data/voice application.
  3. Category 3 twisted pair can transmit data with speed reaching 10Mbps which is slow for voice/data communication.
  4. Category 4 twisted pair can transmit data with speed reaching 16Mbps and is used in token ring networks. It is slow for communicating in a voice/data application.
  5. Category 5 twisted pair is the least qualified to be used in a voice/data application because it can transmit data at speeds that reach 100Mbps.

Hence, Cat 5 or Category 5 twisted pair is the least quality twisted pair that should be used in a data/voice application.

6 0
3 years ago
Given the multiplication 65535 x 32768, will the result cause overflow on a 32-bit system? Will the result need more than 32 bit
Alex

Answer:

65535 x 32768 =214 7450880

which is in the range of 32 bit unsigned integers, so there will be no overflow and we wont be in a need of more bits than 32 bit.

Explanation:

An overflow error indicates that software attempted to write down data beyond the bounds of memory.

Each program features a section of memory allocated for a stack. The stack is employed to store internal data for the program and is extremely fast and keep track of return addressing. A program may jump to a neighborhood that reads some data from the disk drive, then it returns from that routine to continue processing the info. The stack keeps track of the originating address, and therefore the program uses that for the return. Kind of like leaving breadcrumbs to seek out your way back. The stack features a limited amount of space for storing. If software attempts to access a neighborhood of the stack beyond its limits, an overflow error occurs.

• signed 32-bit integers support the range [-2147483648,2147483647]

• unsigned 32-bit integers support the range [0,4294967295]

And if you go outside this range, even temporarily, you would like to be very careful. Most cases handle the overflow technically and provide you "wraparound" or "modulo" behavior where carry bits outside the range just disappear and you're left with the low-order bits like the precise result.

In computer architecture of 32 bit, memory addresses, or other data units are those who are 32 bits (4 octets) wide. Also, 32-bit CPU and ALU architectures are those who have supported registers, address buses, or data buses of that size. 32-bit microcomputers are computers during which 32-bit microprocessors are the norm.

6 0
3 years ago
Review the information for a magazine that a student intends to include on a works cited page. Magazine: Academic Review Title o
ludmilkaskok [199]

Answer:

Cosby, Judson. "The College Application Process." 111-114. Academic Review December 1, 2013: Web.

Explanation:

Cosby, Judson. "The College Application Process." Academic Review 1 December 2013: 111-114. Print.

The above is not the correct format as date syntax is wrong.

Cosby, Judson. "The College Application Process." 111-114. Academic Review December 1, 2013: Web.

This is the right answer.

Cosby, Judson. Academic Review "The College Application Process." 1 December 2013. 111-114. Print.

This is wrong as date syntax is not correct

Cosby, Judson. "The College Application Process." 111-114. Academic Review December 1, 2013: 111-114. Web.

This is wrong as page number is repeated two times.

Hence, the above answer.

4 0
3 years ago
Read 2 more answers
pharmaceutical company is using blockchain to manage their supply chain. Some of their drugs must be stored at a lower temperatu
GuDViN [60]

In this question, the answer is "Artificial intelligence", it is used as the simulation of human intelligence processes by machines, especially computer systems, which is called artificial intelligence.

  • Expert systems, natural language, voice recognition, and object detection are just a few of the specific uses of AI.
  • Its convergence of blockchain technologies such as AI can accelerate machine learning and allow AI to produce and exchange financial goods.
  • The blockchain enables secure storage and data sharing or anything else of value.
  • In this, the data is analyzed, and insights and derived from it to generate value.

Learn more:

Artificial intelligence: brainly.com/question/17146621

3 0
3 years ago
Read 2 more answers
Other questions:
  • You have two LANs connected via a router. Network 1 has a DHCP server with a single Ethernet interface. Network 2 does not have
    9·2 answers
  • Write a program that displays the following pattern: ..\.\* .\.\*** \.\***** ******* \.\***** .\.\*** ..\.\* That is, seven line
    8·1 answer
  • How to transfer photos from iphone to computer
    14·1 answer
  • Explain how touch-tone dialing sends digits to the switch and write the name given to define touch-tone dialing.
    10·1 answer
  • What will save you the most money when trying to reduce the cost of college
    5·2 answers
  • What are some difficulties in synchronizing audio and video during telecine transfer? (Select all that apply.)
    13·1 answer
  • Which type of loan is based on financial need
    6·1 answer
  • Anyone know how to fix this problem on Microsoft Team?
    14·2 answers
  • How can you prevent someone with access to a mobile phone from circumventing access controls for the entire device
    5·1 answer
  • If you select one slice of pie in a pie chart, you have selected a ____
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!