1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
13

Uso de las redes sociales como el uso de una impresora en casa se satisfacen estás tres etapas

Computers and Technology
1 answer:
Svetradugi [14.3K]3 years ago
7 0

Question: what question is this?

You might be interested in
Which organization developed a network called CSNET to provide a network free to all American research and educational instituti
Citrus2011 [14]
<span>The National Science Foundation (NSF) is the organization which </span><span>developed a network called CSNET to provide a network free to all American research and educational institutions. It is an agency in the government of the United States that is responsible for research and development in the field of science and engineering. </span>
7 0
3 years ago
Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
yan [13]

Explanation:

We can divide the multiplex in different categorize, for example:

  • FREQUENCY DIVISION MULTIPLEXERS (FDM)
  • TIME DIVISION MULTIPLEXERS (TDM)
  • STATISTICAL TIME DIVISION MULTIPLEXERS (STDM).

But in this case, we're going to explain about the time and frequency, because the time division multiplex differ to frequency, because the circuit is divided horizontally, and the time is vertically

b. splits the communication circuit vertically (with time slots) instead of horizontally

7 0
3 years ago
Consider the recursive method whose definition appear below. Why? public static String mysteryString (String s){ if(s.length()==
Marizza181 [45]

Answer:

retupmoc

Explanation:

1.) Anwser will be retupmoc

because

public static String mysteryString(String s){

if(s.length() == 1){

return s;

}

else{

return s.substring(s.length() -1) + mysteryString(s.substring(0, s.length()-1));

}

}

In this program input is "computer" . So the function mysteryString(String s) it does

return s.substring(s.length() -1) + mysteryString(s.substring(0, s.length()-1));

so when it enters the first time ??s.substring(s.length() -1) and it will be give you 'r' then it calls the function recursively by reducing the string length by one . So next time it calls the mysteryString function with string "compute" and next time it calls return s.substring(s.length()-1)? + mysteryString(s.substring(0,s.length-1)) so this time it gives "e" and calls the function again recursively . It keeps on doing till it matched the base case.

so it returns "retupmoc".

6 0
3 years ago
suppose task c has two predecessor tasks: task a and task b. task a ends on may 8 and task b ends on may 13. when can task c beg
san4es73 [151]

Suppose task c has two predecessor tasks: task a and task b. task a ends on may 8 and task b ends on may 13. The time that task c can  begin is may 14.

<h3>What does task mean in its other sense?</h3>

It is seen as Assignment, chore, duty, job, and stint are a few examples of common synonyms for task. Task implies work that is imposed by a person in authority, an employer, or circumstances, even though all of these words mean "a piece of work to be done."

Note that you may be asked to write a letter, a feature article, an editorial, or a speech. who you're pretending to write to in response to the prompt. Hence starting by on the 14th is advisable.

Learn more about task  from

brainly.com/question/12831236
#SPJ1

8 0
1 year ago
A student is having trouble finding enough time in his busy schedule to work on his school science project. He has a demanding s
Katena32 [7]

Answer:c

Explanation:

got it rii

3 0
3 years ago
Read 2 more answers
Other questions:
  • One of the biggest risks involved in using e-mail is
    14·2 answers
  • Which organizational pattern would probably be most effective for arranging the main points of a speech with the specific purpos
    15·1 answer
  • PLEASE HELP
    12·2 answers
  • You are a network security administrator for a bank and you have noticed that an attacker has exploited a flaw in OpenSSL and fo
    9·1 answer
  • Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
    11·2 answers
  • ______The statement #include &lt; math.h &gt; defines the name of the current program you are writing as "math". (T/F)
    10·2 answers
  • jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
    11·2 answers
  • Hey mates.........needed asap 1.) Mention and explain four (4) ICT gadgets,
    9·2 answers
  • Which item is used for formatting in responsive web design?
    14·2 answers
  • Which of the following commands can be used to display socket information out to the terminal screen
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!