1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LUCKY_DIMON [66]
3 years ago
15

Necesito 7 innovaciones tecnológicas de la informática para 2021

Computers and Technology
1 answer:
Sonja [21]3 years ago
3 0

‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍

You might be interested in
A peripheral can be used to tell a computer to complete a specific task.<br> A) True <br> B)False
RoseWind [281]

Answer:

A. true

Explanation:

<em><u>because</u></em><em><u> </u></em><em><u>you</u></em><em><u> </u></em><em><u>can</u></em><em><u> </u></em><em><u>complete</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>without it</u></em><em><u> </u></em><em><u>mistakes</u></em><em><u> </u></em><em><u>if</u></em><em><u> </u></em><em><u>your</u></em><em><u> </u></em><em><u>using</u></em><em><u> </u></em><em><u>an</u></em><em><u> </u></em><em><u>computer</u></em><em><u> </u></em><em><u>but</u></em><em><u> </u></em><em><u>if</u></em><em><u> </u></em><em><u>you</u></em><em><u> </u></em><em><u>use</u></em><em><u> </u></em><em><u>an</u></em><em><u> </u></em><em><u>paper</u></em><em><u> </u></em><em><u>you</u></em><em><u> </u></em><em><u>will</u></em><em><u> </u></em><em><u>make</u></em><em><u> </u></em><em><u>mistakes</u></em><em><u> </u></em><em><u>over</u></em><em><u> </u></em><em><u>and</u></em><em><u> </u></em><em><u>over</u></em>

8 0
3 years ago
Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
Anettt [7]

Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

<h3>What is anonymization?</h3>

The term anonymization is known as data masking and it is the standard solution in the case of data pseudonymisation. It is generally recognised by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Data is generally identified by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Therefore, Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

Learn more about anonymization here:

brainly.com/question/4268168

#SPJ4

5 0
2 years ago
token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle netw
ikadub [295]

Given that,

Token is 64 bytes long

The average number of stations that the token must pass = 20

We need to calculate the transmission delay for token

Using formula of transmission delay

Transmission\ delay=\dfrac{token\ size}{minimum\ size}

Put the value into the formula

Transmission\ delay=\dfrac{64\ bytes}{10\ Mbps}

Transmission\ delay=\dfrac{64\times8}{10\times10^6}

Transmission\ delay=0.0000512\ sec

Transmission\ delay=5.12\times10^{-5}\ sec

We need to calculate the average wait to receive token on an idle network with 40 stations

Using formula of average wait

\text{average wait to receive token}=\text{average number of stations that the token must pass}\times transmission\ delay

Put the value into the formula

\text{average wait to receive token}=20\times5.12\times10^{-5}

\text{average wait to receive token}= 0.001024\ sec

\text{average wait to receive token}= 1.024\ ms

Hence, The average wait to receive token on an idle network with 40 stations is 1.024 ms.

8 0
4 years ago
What sorts of items can be
Bumek [7]

Answer:

A router connects multiple computers to the Internet through a single connection. The router manages the flow of data, delivering the right information to each computer on the network. Routers may also be used to connect multiple networks. A managed router is a router that is owned and managed by a third-party.

6 0
4 years ago
What basic drafting instruments are incorporated in a drafting machine?
erastovalidia [21]
It would be the army and then people of nyc
3 0
3 years ago
Other questions:
  • How do i add a blog to my wordpress site?
    7·1 answer
  • What is TCP/IP?
    13·1 answer
  • Once i have internet connection do i need anything else to surf the web
    6·1 answer
  • The local emergency manager has the responsibility for coordinating emergency management programs and activities. A local emerge
    7·1 answer
  • ???????????????????????​
    10·1 answer
  • In apersuasive message, opposing ideas should be:
    13·1 answer
  • A local company is expanding its range from one state to fifteen states. They will need an advanced method of online communicati
    9·2 answers
  • What is one example of an emerging class of software
    12·1 answer
  • MOA115 Medical Records and Insurance
    6·1 answer
  • ____ includes) all tools that capture, store, process, exchange, and use information.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!