1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanya [424]
3 years ago
14

Hello Everyone.I am new here can anyone help me​

Computers and Technology
2 answers:
sergejj [24]3 years ago
6 0

Welcome to Brainly!

I am just an Expert user (I was originally gonna be a co-mod, but decided not to take the role) who wants to help! On this website/app, you can ask/answer questions! If you ever need help, this website is the place to go! Just make sure you don't break the guidelines and as Sniper would say, "Be polite"

Brrunno [24]3 years ago
5 0

<em>Hello</em>

<em>I</em><em> </em><em>am</em><em> </em><em>also</em><em> </em><em>new</em><em> </em><em>here</em><em>!</em><em>!</em>

<em>same</em><em> </em><em>pinch</em><em>.</em><em>.</em>

You might be interested in
Consider a bit stuffing framing method where the start of a frame is indicated by 6 consecutive ones, followed by 2 zeroes. What
Anastaziya [24]

Answer:

Explanation:

Bit stuffing Framing Method

In the given situation, the beginning casing is shown by 6 sequential ones followed by 2 zeroes.

The beginning casings are generally known as the flags.which are utilized for demonstrating the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the reciever.

Along these lines here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).

To enable us understand how this question plays out, let us understand the rule for Stuffing and De-stuffing .

The standard for stuffing is :

At whatever point there are 5 successive ones supplement one zero in the casing which is an information. The embedded zero piece is known as the stuffed bit.The principle reason behind stuffing somewhat after 5 back to back ones is to evade the distortion of information (data) as flag. If the reciever misconstrues the information as end banner then he would quit recieving the information where the entire information sent by the sender will be left and lost causing an error-prone information.

The rule for destuffing :

The standard/rule for destuffing is only inverse as stuffing. After recieving the bitstuffed information (data), at the reciever's end zero after each 5 continuous ones will be evacuated and the rest of the information will be considered as the genuine information.

In the given situation, the beginning casing is demonstrated by 6 back to back ones followed by 2 zeroes.

the beginning casings are normally known as the flags.which are utilized for showing the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the receiver.

In this way here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).

  • data before bit stuffing is:  011111100011111101
  • the stream after stuffing would be: 011111<u>0</u>10001111<u>0</u>1101

where the bolded/underlined digits represents the stuffed bits

cheers i hope this helps

3 0
3 years ago
Let’s say you are given the task of retouching a famous model’s photograph. To what extent will you retouch the image? In your o
Bogdan [553]

Retouching a photograph, specially that of a famous model, is somewhat a touchy issue since there are no boundaries defined for it and when you think you are just doing your job right, people might still be offended with their image being manipulated in so many ways. In my opinion, the main purpose of retouching is to improve a photograph, which may include color correction, improving the clarity, clearing out any distractions or noise and since in this case we have a model's photo so we might just need to enhance  the features or perfecting the skin, which may include changing the color tone of the skin or to shrink or enhance the physical aspects accordingly, just to make a photograph the best version of it.

As a re-toucher, one must have the responsibility to acknowledge that no matter how hard you have tried to make the image look better, there will be people who still might judge your efforts as demeaning. So its solely in your hand how you act and edit different pictures of different subjects differently.

3 0
3 years ago
Read 2 more answers
If you need to add more data between column C and column D, you should _____.
lina2011 [118]
Right click on the line separating the two columns, and you should be able to select "add column"
4 0
4 years ago
Public static void prefixmerge(customer[] list1, customer[] list2, customer[] result {
White raven [17]
I can't get what do you need, but I guess it's a part of java code. I can explain what it means. It's used to unite two rising sorted arrays which are list1 and list2. The result is stored in result array. I suggest you to clearly explain your task as it's difficult to give you correct answer.
8 0
4 years ago
Consider the following incomplete code segment, which is intended to increase the value of each digit in a String by one. For ex
arlik [135]

The instruction that should replace /* Missing Loop Header */ so that the code segment works as intended is (c)  counter < num.length()

<h3>Loops</h3>

The program is an illustration of loops (the while loop)

While loops are program statements that are used to perform repeated operations

For the string to return 23456, the while loop body must be repeated as long the counter is less than the length of the string num

Hence, the missing loop header is counter < num.length()

Read more about loops at:

brainly.com/question/15683939

7 0
3 years ago
Other questions:
  • Which of the following is not an important consideration before a business invests in a particular technology?
    12·1 answer
  • Which item is essential to know before sketching a navigation menu flowchart
    15·2 answers
  • What is the name of the malware included in CCleaner?
    13·1 answer
  • When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive
    12·1 answer
  • Extending the web server functionality implies that the web server and the web-to-database middleware will properly communicate
    10·1 answer
  • Python
    5·1 answer
  • To override a method in a subclass, the method must be defined in the subclass using the same signature and compatible return ty
    12·1 answer
  • When the condition of an if statement is false, the computer will return an error message to the user.
    15·2 answers
  • PLSS HELP ASAP ILL GIVE BRAINLIES THANKS
    7·2 answers
  • Universal containers wants internal support requests to be directed to any of the IT reps. They want external support requests t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!