1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
3 years ago
15

What is this?

Computers and Technology
2 answers:
antoniya [11.8K]3 years ago
5 0
Answer: it looks like the thing u punch wholes with (i frogot what its called)
Andre45 [30]3 years ago
4 0

Answer:

It looks like a Lead Screw

You might be interested in
What is a sloper
Andreas93 [3]

Answer:

Option 2: Sloper is a basic pattern in a garment.

Explanation:

Sloper is a building block of each patterns like stem cell is the beginning of everything. It is basically a generic pattern based on all the measurements we have.

Now we speaking in terms of computer language, can relate sloper with a function, which is a part of a program. We can alter a function to achieve desired and required results. Similarly, a sloper is a main part of the garment containing information about how to alter the garment to fit you perfectly.

So, without sloper we have nothing to design and having sloper means we have everything.

7 0
4 years ago
8.14 Consider a system in which bus cycles takes 500 ns. Transfer of bus control in either direction, from processor to I/O devi
alexira [117]

Answer:

A) 2.56 ms

B) 128 μs

Explanation:

Time for Bus cycles = 500 ns

Transfer of bus control = 250 ns

I/0 device data transfer rate = 50 KB/s

Data are transferred at : 1 byte at a time

A) Determine how long the device tie up the bus when transferring a block of 128 bytes

Block size to be transferred = 128 bytes

Bandwidth = 50 KB/s

data transfer = (Block size ) / ( Bandwidth)

                     = ( 128 * 8 ) / ( 50 * 10^3 * 8 )

                     = ( 1024 ) / ( 50 * 10^3 * 8 )

                     = 2.56 ms

To determine the actual transfer time  we have to add up the transfer time for the bus control in both directions :

2.56 ms + 500 ns = 2.56 ms. this is because 500 ns is not a significant value

B) cycle stealing mode

In this mode each byte is transferred at a time and The total transfer time needed for the bus control in both directions will be double the total time i.e 2 * 500 ns = 1000 ns. because additional control time of  250 ns is required at both ends

since 1 byte is transferred at a time , 1 byte will be transferred in 1 μs

128 bytes = 128 *  1 μs = 128 μs

4 0
3 years ago
Why are there 2 types of ip addresses like 172.16.254.1 or 2001:db8:0:1234:0:567:8:1?
solong [7]
The first example is an IPv4 address. Because IPv4 is only 32 bits long there are only about 4 billion addresses available. To expand the address space IPv6 came into existence and your second example is an IPv6 address.
7 0
3 years ago
Storage device that is installed inside your computer is called?
liraira [26]
Its either called an HDD or an SSD
3 0
3 years ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
Other questions:
  • What do we call the distribution and access of illegal copies of digital books??
    10·1 answer
  • What kind of problems could you run into if you format a cell with the wrong format for the data type?
    15·2 answers
  • You would like the user of a program to enter a customer’s last name. Write a statement thaUse the variables k, d, and s so that
    5·1 answer
  • The Joint Photographic Experts Group developed the ___________ graphic format.
    12·2 answers
  • Dallas is an analyst at an online retailer. He is great at creating representative diagrams showing the relationships between cu
    12·1 answer
  • Pls help!!!!!!!!!!!!
    13·2 answers
  • It is believed that Taiwan is the original home of these early Oceania explorers. Maori Lapita Polynesians Aborigines
    13·2 answers
  • The data-mining technique that creates a report or visual representation is _____.
    13·1 answer
  • A student wrote a song. Another student posted a video of the song on You Tube, claiming to have written the song. This is most
    15·1 answer
  • The area of ai that investigates methods of facilitating communication between computers and people is?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!