1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
13

Write your question here (Keep it clear and simple to get the best answer)

Computers and Technology
2 answers:
weeeeeb [17]3 years ago
4 0
What is your favorite book?
Shalnov [3]3 years ago
3 0
Do you have any pets? If so what type?
You might be interested in
The length of the hypotenuse of a right-angled triangle is the square root of the sum of the squares of the other two sides. Wri
Maksim231197 [3]

Answer:

# include<cmath>

# include <iostream>

# include<stdio.h>

using namespace::std;

int main()

{

   

   float a, b, c;

   cout<<"Enter a (Perpendicular)"; cin>>a;

   cout<<"Enter b (base)";cin>>b;

   c= sqrt(pow(a,2) + pow(b,2));

   cout<< "Hypotenuse="<<c;

   return 0;

}

Explanation:

Please check the answer section.

4 0
3 years ago
How is blockchain different from traditional database models?
Natasha2012 [34]

Answer:

The primary difference between a blockchain and a database is centralization. While all records secured on a database are centralized, each participant on a blockchain has a secured copy of all records and all changes so each user can view the provenance of the data.

5 0
2 years ago
What is a font tag? And full form of HTML?
dimulka [17.4K]

Answer:

HTML | <font> Tag. The <font> tag plays an important role in the web page to create an attractive and readable web page. The font tag is used to change the color, size, and style of a text. The base font tag is used to set all the text to the same size, color and face

4 0
3 years ago
What kind of battery does a dji spark have?
shutvik [7]
Lithium-Ion Battery. The same kind of battery found in smartphones, laptops, etc.
6 0
4 years ago
Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
fgiga [73]
Client/Server and Peer-to-Peer networks are the two major network architecture models in use today. They each have advantages and disadvantages that can be used to benefit a particular outcome.

Briefly, the client/server model relates to one or many client performing relatively simple requests, which are then executed by a server. The server is performing more complex tasks, and often interacting with many clients simultaneously. Examples of client/server models include most websites, including the Brainly page you are running right this instant. Your web browser is acting as a client, and the Brainly.com website is running as a web server. It receives simple requests or information from your browser, such as clicking on a question or text typed by your keyboard, and then acts on this information by consulting a database, returning values, or returning a whole new web page to your browser. The client/server model is very powerful in business as it allows powerful and secure server-side processing and relatively simple clients. Office 365 that runs all microsoft office suites such as word and excel in a web browser on 'the cloud' is an example of a highly sophisticated client/server architecture.

By contrast, peer-to-peer networks are a distributed architecture of equals. Instead of a simple client and complex server, all clients are equals and link together to form nodes on a distributed network. There is no central control (server) and each node acts as a client and server to other nodes. This is also an extremely powerful network; as there is no central control it is difficult to shut down a peer-to-peer network. Taking out one node will not break the network in comparison to the client/server architecture where if the server goes down, services halt. Prime examples of famous peer-to-peer networks are the Bitcoin network and similar cryptographic currency networks, and music and file sharing networks such as Torrents. The torrent tracker websites are client/server however once a torrent is loaded into a torrent downloading application, the file is collectively downloaded from hundreds of 'peers' across the world as part of the torrent peer-to-peer network.


3 0
4 years ago
Other questions:
  • Write a program that prompts the user to enter a three digit integer and determine whether it is a palindrome number.
    12·1 answer
  • What is the process of getting as many people as possible to visit your website called? A. Maximizing keyword potential B. Direc
    9·2 answers
  • Under what circumstances would it be appropriate to use the sentence method of note taking, and what are the advantages and disa
    7·2 answers
  • Develop a Python module that will prompt the user for a target sum that is greater than 0 and less than 1 for the following Geom
    13·1 answer
  • What is wrong with each of the following?
    6·1 answer
  • Where are the worksheet tabs located
    7·1 answer
  • _KOH + _Cu(CIO3)2 - __KCIO3 +<br>_Cu(OH)2​
    12·1 answer
  • What is analog computer?​
    14·1 answer
  • A process spawning or initiating another process is referred to as _____
    8·1 answer
  • which of the following is acomputer program that detects, prevents. and takes action sto deactivate or remove malicious programm
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!