1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
6

Salvado has a flash dish of is GB

Computers and Technology
1 answer:
exis [7]3 years ago
6 0

Answer:

About 1,655 files or exactly 1655.646315789473684210526315785

1578

Source(s):

1.5 gb = 1,500 mb<---wrong right --->1536

Explanation:

You might be interested in
If your network subnet mask is /16, what is the maximum number of host ids available for this network?
kupik [55]
65534






-------------------------------------------
8 0
3 years ago
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
goldfiish [28.3K]

Answer:

signal repeaters.

Explanation:

The best device to use in this scenario would be signal repeaters. These basically grab an already existing signal and repeats it in a specific direction therefore amplifying the range. These devices are usually used when a large network system is not reaching certain devices that are located too far away. These devices are then placed in midpoints between the network and the device and aimed towards the direction of the device. It then picks up the existing signal and retransmits it to the devices' location so that the device can pick up the network signal and access it.

6 0
3 years ago
Choose the word that best completes this sentence. ____________ should cover every part of the worksite.
Evgen [1.6K]
Since you provide no choices, here are several things that should cover every part of the worksite :
- Emergency exit
- Safety measures

Hope this helps
5 0
3 years ago
Read 2 more answers
How do you find a single number or name you want in a
Tamiku [17]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

You can find a single number or name in a large worksheet containing thousands of numbers and names using the find and replacement feature in excel.

You can use Ctrl+F keyboard shortcut for finding and replacing features. When you press Ctrl+F, a dialog will get open, using this dialog, you can find the required number or name while entering in the search text box. Then, click on the Find button, if the worksheet matches the result, give you the matched result in the yellow highlighted color.

Also, you can use Ctrl+F to replace a name or number with some other name or number.

Alternatively, you can do this using the home tab, then find the option find and select under the editing group of commands.

8 0
3 years ago
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
Other questions:
  • What role do career pathways play?
    11·2 answers
  • Blender questions
    8·1 answer
  • Which of the following sentences uses the correct verb tense?
    8·2 answers
  • What are scape codes and the effectes on out put
    6·1 answer
  • In DTP, a good rule of thumb is to use as many special effects as you need to make your documents look interesting.
    5·1 answer
  • Heres the last questions
    5·1 answer
  • Write the algorithm and draw a flowchart to display the greatest number among any two different numbers....
    5·1 answer
  • Which option allows users to access the handout master to modify it?
    13·2 answers
  • Which four of the following qualify as fair use?
    11·2 answers
  • How can you remove background noise from a video?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!