1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
11

Direction. See

Computers and Technology
1 answer:
storchak [24]3 years ago
8 0

Answer:

1.A

2.A

3.B

4.A

5.D

6.A

..............

You might be interested in
ROM stores data as you search the internet to help increase the speed of your computer.
olasank [31]

Answer:  

The answer to the following question is "false".  

Explanation:  

In computer science, ROM stands for read-only memory. ROM is an electronic device that stores data. It is non-volatile which means that the data is saved even if the part drops power. Once information has been signed into a ROM, it cannot be removed and can only be read.  So the answer to this question is "false".

5 0
3 years ago
In which scenario would instant messaging be more useful than other forms of communication?
Fed [463]
When you're in a library and you don't want to disturb other people.
8 0
3 years ago
a 83. is a transition method that encapsulates ipv6 traffic inside ipv4 packets. a. tunneling c. natting b. scheduling d. dual s
finlep [7]

Tunneling  is a transition method that encapsulates ipv6 traffic inside ipv4 packets.

<h3>What is Tunneling?</h3>

Tunneling is known to be a term that connote a kind of a protocol that gives room for the secure transmission of data from a single network to another.

Note that the act of Tunneling involves giving room also to private network transmission to be sent across a given public network, such as the Internet, via a process known to be encapsulation.

Hence, based on the above, Tunneling  is a transition method that encapsulates ipv6 traffic inside ipv4 packets.

Learn more about Tunneling   from

brainly.com/question/18994946

#SPJ4

8 0
2 years ago
After 4th collision in ethernet, find the maximum time that the adapter waits until sensing the channel again for a 100 mbps bro
VARVARA [1.3K]

Waiting time for a 100 Mbps broadcast channel is 0.512 ms

Recall that with the CSMA/CD protocol, the adapter waits K * 512 bit times after a collision,

where K is drawn randomly. For K = 100,

The one bit time for 10 Mbps is 1/10000000 s = 0.0001 ms

The one bit time for 100 Mbps is 1/100000000 s = 0.00001 ms

Waiting time for a 10 Mbps broadcast channel is K*512*0.0001= 5.12 ms

Waiting time for a 100 Mbps broadcast channel is K*512*0.00001= 0.512 ms

<h3>What is a collision in Ethernet?</h3>
  • A collision happens on a half-duplex Ethernet network when two devices on the same network attempt to communicate data at the exact same time.
  • The two transmitted packets are "collapsed" by the network, which results in the network discarding both of them.
  • On Ethernets, collisions are unavoidable.
  • A collision is a momentary interaction between two bodies or more than two bodies at once that modifies the motion of the bodies involved as a result of the internal forces at work.
  • Collisions entail the application of force (there is a change in velocity).

Learn more about collision in Ethernet: brainly.com/question/14123270

#SPJ4

3 0
2 years ago
What impact, if any, does the complexity of a piece have on the piece’s flowchart?
-BARSIC- [3]
I’m pretty sure the answer is either A or D
7 0
4 years ago
Other questions:
  • For a color display using 8 bits for each of the primary colors (red, green, blue) per pixel, what should be the minimum size in
    6·1 answer
  • Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P
    7·2 answers
  • I have tried installing "windows media player" on my computer but at a point, something disrupts its instalment or I am asked to
    7·1 answer
  • Select the correct answer.
    7·1 answer
  • How do you add a PDF assignment to google docs and be able to edit it?
    13·1 answer
  • 1. Write a recursive method to determine if a character is in a list of characters in O(logN) time. Mathematically prove (as we
    13·1 answer
  • I have this assignment due TONIGHT BEFORE 10PM! Please help. 50 points for whoever will help!! Here is the assignment.
    7·1 answer
  • What is the name of the virus that appears to be a legitimate program but when opened
    9·1 answer
  • Hi, I just have a few questions from my digital tech assignment.
    14·2 answers
  • you are installing two new hard drives into your network attached storage device your director asks that they be put into a raid
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!