1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Snowcat [4.5K]
3 years ago
12

Hey plz help, and thanks

Computers and Technology
2 answers:
Tema [17]3 years ago
8 0
D maybe??? Sorry if it’s wrong
timofeeve [1]3 years ago
7 0

Answer:D im pretty sure

Explanation:im sorry if get it wrong So sorry ok just sorry

You might be interested in
What is the best data type for traveling day?
kykrilka [37]
Here if its wrong sorry

7 0
3 years ago
Suppose that a disk drive has 5000 cylinders, numbered 0 to 4999. The drive is currently serving a request at cylinder 143, and
bazaltina [42]

Answer:

a. The FCFS schedule is 143, 86, 1470, 913, 1774, 948, 1509, 1022, 1750,130. The total seek distance is 7081.

This is the first come, first serve schedule

b. The SSTF schedule is 143, 130, 86, 913, 948, 1022, 1470, 1509, 1750,1774. The total seek distance is 1745.

Shortest seek time first scheduling

c. The SCAN schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774,4999, 130, 86. The total seek distance is 9769.

d. The LOOK schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774, 130, 86. The total seek distance is 3319.

e.The C-SCAN schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774,4999, 86, 130. The total seek distance is 9813

6 0
3 years ago
What key is in the upper-left corner of the keyboard?? ​
Marianna [84]

AnswertabAnswer:

(ESC) Escape

Explanation:

The function of this keyboard key is to escape the current t view or mouse inversion you are on, or it could be used as a keyboard shortcut when used with other keys.

7 0
2 years ago
"A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with
Olegator [25]

Answer:

C.

Explanation:

Based on the information provided within the question it can be said that the best thing to do in order to accomplish this would be to create a DMZ and add all the necessary hosts to it. A DMZ or demilitarized zone is a feature that allows those on the list to bypass all security features and have access to the organization's external-facing services.

4 0
3 years ago
Alguien me puede ayudar a arreglar mis auriculares que mi perro rompió en el conector
Strike441 [17]
Que rompio el perro? Todo depiende de la situacion. 
7 0
4 years ago
Other questions:
  • A machine is a group of mechanical devices that transfer ___ input at one device into output at another device.
    6·1 answer
  • What does confidentiality of data refer to?
    6·2 answers
  • The three devices you are going to install are a 2u server, a 1u keyboard tray, and an 8u space for a rack mounted moitor. Given
    6·1 answer
  • The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities an
    12·1 answer
  • You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
    12·1 answer
  • Which system procedure is normally done with both hand valves opened on a gauge manifold connected to a refrigeration system?
    7·1 answer
  • Choose all items that represent characteristics of HTML attributes.
    5·2 answers
  • Any device that uses light to read and write information.
    9·2 answers
  • What is the difference between a crosstab query and a subquery?
    11·2 answers
  • Which disipline involves creating computer networks
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!