1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
3 years ago
8

Using reliable internet sources, identify three ways we use analog and digital signals in our everyday lives.

Computers and Technology
1 answer:
Montano1993 [528]3 years ago
7 0
Clocks maybe is the answer. I really don’t know
You might be interested in
Write a machine code program for all the following problems. Test to make sure that they work in LC3. It's best to complete each
Usimov [2.4K]

Answer:

Following is given the solution to each part.

All the comments are given above each step so that they can make the logic clear.

I hope it will help you!

Explanation:

8 0
3 years ago
How does speech recognition software know what you are saying?
boyakko [2]
It converts the mic input into a string of raw data, then compares it to hundreds, even thousands of voice samples. The output is a polished string of data in words.
8 0
3 years ago
Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
irinina [24]

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires is True.

True

<u>Explanation:</u>

In network packet loss is considered as connectivity loss. In this scenario host A send two segment to host B and acknowledgement from host B Is awaiting at host A.

Since first acknowledgement is lost it is marked as packet lost. Since in network packet waiting for acknowledgement is keep continues process and waiting or trying to accept acknowledgement for certain period of time, once period limits cross then it is declared as packet loss.

Meanwhile second comes acknowledged is success. For end user assumes second segments comes first before first segment. But any how first segment expires.

3 0
2 years ago
PLEASE HELP ASAP!! WILL MARK BRAINLIEST!! 20 POINTS!!
Sonbull [250]

Answer:

kiss me

Explanation:

you must kiss me

8 0
3 years ago
Agent Hunt is transferring classified files from the CIA mainframe into his flash drive. SSS represents the size of the files on
stiv31 [10]

Answer:

The size on the drive before the transfer is 45 megabytes

Explanation:

Before transfer, t which is the time in seconds is 0. Therefore given the formula: S = 5t + 45,

substituting t into the formula gives;

S = 5(0) + 45

S = 0 + 45

S = 45

7 0
3 years ago
Other questions:
  • What would happen if computers only had input peripherals and a CPU?
    13·1 answer
  • Ann is in the middle of completing her first 1040EZ tax form. She has some questions about an instruction on the form. What shou
    8·2 answers
  • I need to write a program that accepts eight int values representing student test scores from the user and then displays each of
    14·1 answer
  • A typeface in which each character has the same width and is often used to display programming code is _
    8·1 answer
  • This type of technology typically does NOT come with a keyboard or mouse for input.
    14·2 answers
  • Fill in the blank to complete the sentence. -------------------- is used to store and process data over the Internet using compu
    10·1 answer
  • Your principal has hired you to design a drone that can monitor students in the hallways. Before you brainstorm design ideas, yo
    15·2 answers
  • Choose all items that represent examples of good website accessibility.
    8·2 answers
  • 1. Open command prompt
    5·1 answer
  • Which option is an example of an algorithm that is used in daily life?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!