1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
14

Which statement describes one of the responsibilities of a computer programmer?

Computers and Technology
1 answer:
galben [10]3 years ago
6 0

Answer:

d i think

Explanation:

You might be interested in
Given a typical magnetic hard drive with five platters, answer the following:
Nataly_w [17]

Answer:

Given the number of platters =5

A. Hence, the number of recording surface =10

B. number of read-write heads =10

C. Number of arms holding the read-write heads = 10

Explanation:

We know that number of recording surface = 2 *( number of platters)

= 2*5=10

And the number of read-write heads = number of recording surface= 10

Also, number of arms holding the read-write head = one for each read-write head= 10

And hence, the above answer.

5 0
3 years ago
To what would you compare the transport layer?
GarryVolchara [31]
The above question has multiple choices as below

<span>A. Data links
B. The post office
C. Driving a car
D. A train

The answer is (B) The Post Office.

In layman’s terms, transport layer is similar to the post office functions of delivering parcels and letters at the agreed delivery deadlines. It also notices any dropped info and re-transmits it.
Just like the post office, the transport layer directs messages and information between specific end users. If by mistake you write a letter to the wrong person, the letter will be returned and the postal employee will stamp it as address unknown.

</span>
4 0
3 years ago
) how many bits are used for host number on the child network (subnet) , b) how many usable addresses can exist on this child ne
vovikov84 [41]

Answer:

Machine’s IP=126.127.85.170, Machine’s Netmask=/27, Parent’s Netmask=255.255.240.0 .

a) Machine's Netmask = /27 : therefore no. of remaining bits for hosts =32-27 = 5 bits.

b) No. of usable addresses in the child network = 25 -2 = 32-2 =30 [Since first(network ID of the machine) and last ip (broadcast address of the machine ) addresses are not used ]

c) first usable address is on this child network (subnet) =

First, find out the network id of machine can be found out by doing bitwise AND machine's IP and Machine's subnet mask :

01111110. 01111111.01010101.10101010 (IP)

11111111. 11111111 .11111111 .11100000 (Subnet Mask)

01111110. 01111111. 01010101.10100000 (Network ID )

first usable address is on this child network (subnet) :   01111110. 01111111. 01010101.10100001

: 126.127.85.161

d) what the last usable address is on this child network (subnet) :  01111110. 01111111. 01010101.10111110

: 126.127.85.190

e) what the child network’s (subnet's) broadcast address is :

In the directed broadcast address , all the host bits are 1. Therefore, broadcast address :

01111110. 01111111. 01010101.10111111 (126.127.85.191)

f) what the child network's (subnet's) network number is : Network ID has already been calcuulated in part c .

01111110. 01111111. 01010101.10100000 (126.127.85.160)

6 0
3 years ago
What Is an Antivirus?
wariber [46]
Antivirus software, or anti-virus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name.
8 0
3 years ago
Read 2 more answers
What is a reason for users and businesses to adopt 5G networks?
anzhelika [568]

Answer:

I think users and businesses needs to adopt 5g networks for primary benefits include improved bandwidth, latency, reliability, connection density and security - all important factors in the increasing move to remote working and greater reliance on online services

Explanation:

sana po nakatulong

7 0
2 years ago
Other questions:
  • In Java :
    11·1 answer
  • Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r
    12·1 answer
  • All users on the network have antivirus software; however, several users report that they have what an administrator described a
    10·1 answer
  • Dora electronically transferred $591.68 from her checking account to Matt's checking account. In what column of the check regist
    14·2 answers
  • How to search for the largest files on my computer vista?
    5·1 answer
  • Please check my answer! (Java)
    7·1 answer
  • Write HTML code for inserting an image "cricket.jpeg" in size 500 width and 400 height.
    12·1 answer
  • What color mode would you use when designing for web &amp; devices?
    9·1 answer
  • Political parties to address the interest of civil society<br>​
    7·1 answer
  • a) pencil b) ink bottle c) polygon d) eye 3. Under which of the following can an operating system be classified? b) software c)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!