1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Salsk061 [2.6K]
3 years ago
6

Bruh why is everyone skipping my question!!!!!!!

Computers and Technology
1 answer:
DiKsa [7]3 years ago
7 0

Answer:

What is your question?

Explanation:

You might be interested in
Is doing free lancing from age 16 good or bad?​
Art [367]

Answer:

I think it's good. It will serve as an experience for you. Having experience at an early age is better as you could be at your best before you go into the field that you want. Plus free lancing wouldnt tie you down, gives you more freedom. And extra income(?). ^^

8 0
3 years ago
A video streaming website uses 32 bit integers to count the number of times each video is played. In anticipation of some videos
Over [174]

Answer:

c) 2^32 times as many values can be represented.

Explanation:

It's funny, this problem comes from a real-life situation, except it wasn't really foreseen :-)  And we will encounter a similar problem in less than 20 years.

The difference in terms of storage capacity from 32-bit integers and 64-bits integers is huge.

A 32-bit integer can store (signed) numbers up to 2,147,483,647. (so over 2 BILLIONS)

A 64-bit integer can store (signed) numbers up to 9,223,372,036,854,775,807 (9 BILLIONS of BILLONS)

5 0
3 years ago
Read 2 more answers
Do you think should give credit to people who invented viral dances?
guajiro [1.7K]

Answer:

michal jackson i think who credit to people invented viral dances.

3 0
3 years ago
Read 2 more answers
The list below represents the contents of a computer's main memory. I've left every other byte blank. Assume that the letters at
inysia [295]

Answer:

3) A Single linked list is a sequence of elements in which every element has link to its next element in the sequence.

DATA LINK

DATA stores actual value , LINK stores address of next node

As per information given in question, letters at the even addresses are items in linked list and the odd addresses will be used as links.

Even Address Odd Address

12 (Stores 't') 13 (Used as link)

14 (Stores 'm') 15 (Used as link)

16 (Stores 'a') 17 (Used as link)

18 (Stores 'r') 19 (Used as link)

20 (Stores 's') 21 (Used as link)

Numbers represented by circle are addresses of respective nodes. Here Front or Head has address 16. Which represents the Head Node.

Following image represents the word "smart" with respective nodes and their addressing.

​

Numbers represented by circle are addresses of respective nodes.

The head pointer is: 20

7 0
3 years ago
What are some advantages and disadvantages of streaming and downloading?
stepladder [879]

Answer:

Pro Cons

It is possible to download legitimate music files that do not include DRM and so makes it easier for you to listen to your tracks on different devices. The file may include DRM protection that you were not expecting when you joined the service. Read the fine print.

Explanation:

7 0
3 years ago
Other questions:
  • Two positive outcomes generally associated with modern computing are greater _____.
    12·2 answers
  • Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.
    8·2 answers
  • What Is The Oldest Known Analog Computer In The World?
    14·1 answer
  • Your mom calls you. She is creating a book of poetry. Many of these poems only take up the first half of a document . She asks i
    10·2 answers
  • 15. The most efficient way to perform data entry is to keep your hands on the keyboard and press _______ to move to the next cel
    13·1 answer
  • In Word, the mailing list is known as the ​
    12·1 answer
  • List three ways you can help somone who is being cyber bullied instead of just being a bustander​
    7·2 answers
  • An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
    8·1 answer
  • How will you define a text?
    10·1 answer
  • Create a defined name for range b6:e6 using walkup as the range name
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!