1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
7

How to solve household arithmetic​

Computers and Technology
1 answer:
cluponka [151]3 years ago
3 0

Answer:

just follow it's own formula

You might be interested in
Which of the case studies that you read (Walmart, Target or 5 Big Data Industries) caught your attention and why? Before reading
IrinaK [193]

Answer:

Walmart has caught my attention many times, and definitely when I was reading a case study on it recently. The data that they have collected is from all over the world, and probably the most well planned as it originates from some very high level and good analytics, awesome queries and various other heterogeneous sources. And they have a very unique way of using this data. Being an Engineer however myself, I have studied Data warehousing and Data mining in detail as well as Machine learning. And Walmart first collects the data using Data warehousing, and then it cleans it using the statistics, artificial intelligence, machine learning and statistics, and finally makes a model using the machine learning. They call it all together Data science, and the collected data is being termed as big data, and it has all typos of data which includes images, text, video, sound, animations, and all. Apart from Walmart, you can think of all the social media sites, e-commerce sites, and a lot more.  All are using the data warehousing, data mining and Machine learning all together.  

Explanation:

The answer is self explanatory.

7 0
3 years ago
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
sashaice [31]

Answer:

The answer is below

Explanation:

Suppose end system A wants to send a large file to end system B, the large file is first divided into smaller chunks. Each chunk is then assigned a header forming a packet. Multiple packets are being generated with each of the packet containing a unique destination address in its header.

When a packet arrives at the packet switch, the switch uses the unique destination address that is attached in the header of the packet to determine the link onto which the packet is to be forwarded.

5 0
3 years ago
Rick works for the government and is investigating a small business that the government suspects has been cheating on its taxes.
Mandarinka [93]
The answer is B: fraud examiner
5 0
4 years ago
people illegally download music over the internet although it's free it it is still illegal what do you choose to do? why
kodGreya [7K]

Answer:

its A i just did that

Explanation:

4 0
3 years ago
The Dark Web is _____. Select 2 options.
fiasKO [112]

Answer:

a. an international marketplace where criminals buy and sell products.

c. a capitalistic marketplace for criminals and non-criminals.

Explanation:

In computing, WWW simply means World Wide Web. The world wide web was invented by Sir Tim Berners-Lee in 1990 while working with the European Council for Nuclear Research (CERN); Web 2.0 evolved in 1999. Basically, WWW refers to a collection of web pages that are located on a huge network of interconnected computers (the Internet). Also, users from all over the world can access the world wide web by using an internet connection and a web browser such as Chrome, Firefox, Safari, Opera, etc.

In a nutshell, the world wide web (www) is an information system that is generally made up of users and resources (documents) that are connected via hypertext links.

The dark web also referred to as darknet, can be defined as a subset of the world wide web that is intentionally encrypted from conventional web browser and search engines. Thus, it is a peer-to-peer network that requires the use of specialized configuration and web browser such as "Tor browser" in order to access its contents.

Generally, all the internet activities carried out on the dark web are anonymous and private, thereby making it suitable for either legal or illegal operations. Also, it's devoid of government influence or control and as such it's typically a capitalistic marketplace, where goods and services are privately owned and controlled by the people.

Hence, we can deduce that the dark web is simply;

I. An international marketplace where criminals buy and sell their products.

II. A capitalistic marketplace for criminals and non-criminals.

4 0
3 years ago
Other questions:
  • In Google search results, how are organic links different from sponsored links?
    13·2 answers
  • Can someone help me
    8·1 answer
  • A jeweler designing a pin has decided to use five stones chosen from diamonds, rubies, and emeralds. In how many ways can the st
    9·1 answer
  • Which of the following sentences is correct?a. Arithmetic log unit is used to perform both integer and floating point computatio
    8·1 answer
  • Generally, websites ending in .edu, .gov, and .org are less likely to be biased, or to show preference toward a certain financia
    12·1 answer
  • 3. Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requ
    9·1 answer
  • Why would students most likely need to collect data? Check all that apply.
    12·2 answers
  • What describes a relationship between edge computing and cloud computing?
    6·1 answer
  • Question # 4
    5·1 answer
  • Wml script is used in? ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!