1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
3 years ago
15

What are two different ways by which a laptop could utilize the cellular network connection of a mobile device

Computers and Technology
1 answer:
Stella [2.4K]3 years ago
6 0

Answer:

Tethering and hotspot

Explanation:

Tethering and hotspot are the two different ways by which a laptop could utilize the cellular network connection of a mobile device.

Tethering usually involves connecting the computer or smartphone to the internet with the aid of a USB cable while hotspot involves connection of the device to the internet through the WIFI option.

You might be interested in
What are 3 things that can make cyberbullying especially harmful​
motikmotik

Answer:

Anxiousness and depression

Suicidal Thoughts

Anger

Explanation:

Three major side affects of cyber bullying are

  1. Anxiousness and depression
  2. Suicidal Thoughts
  3. Anger

Anxiousness and depression

Cyber bullying takes away self esteem and self confidence.Lack of self esteem makes person to feel bad about him/her self and lack of confidence makes taking daily life decision very difficult which all adds up to stress

Anger

Some people might feel powerless while others strike back on the bullies in anger.Unchecked anger can be very dangerous.Burning in the flames of anger a person will plot revenge and can go to any means for this. This starts a never ending bully-victim cycle

Suicidal Thoughts

Depression if not cured can lead to suicidal thoughts. When a person is felling low and have no self confidence death seems an easy way out.

3 0
3 years ago
Suppose Pentax develops a new photo editing software and negotiates agreements with a Vietnamese manufacturer to assemble most P
Elis [28]

Answer:

Contract manufacturing

Explanation:

Contract manufacturing involves outsourcing a portion of a manufacturing process of a product to another company.

5 0
3 years ago
__________ is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help ma
klemol [59]

Answer:

Business Intelligence .

Explanation:

Business intelligence is a type of technology that is used by enterprises for the analysis of the data about the information of the business intelligence converted the usefulness data into its corresponding  information which is meaningful.

The main function of the business intelligence for organizing the data, analyzing the data, and providing access data to the manager as well as for the other enterprise for the decision making activity.

6 0
3 years ago
Sally is editing her science report about living things. She needs to copy a paragraph from her original report.
nignag [31]

Answer:

Open Original document = 1

Highlight text = 2

Press Ctrl+C keys = 3

Switch view to new document = 4

Place cursor where text needs to go = 5

Press Ctrl + V = 6

Explanation:

I hope this helps!

4 0
3 years ago
Read 2 more answers
Given the following characteristics for a magnetic disk pack with 10 platters yielding 18 recordable surfaces (not using the top
soldi70 [24.7K]

Answer:

a. 11 blocks / track

b. 1400 bytes / track

c. 1819 track

d. 2,545,200 bytes / file

e. 18190 ms = 18.19 s

f. 16.842 s

Explanation:

a. D = Number of blocks per track

E = B * L = 1600 bytes / block

The number of blocks per track must be an integer. The INT function finds the integer part of a number.

D = INT( R / E ) = INT(11.875) = 11 blocks / track

b. F = Waste per track = R - D * E = (19000 bytes / track) - (11 blocks / track) * (1600 bytes / block) = 1400 bytes / track

This is a wastage of about 7.4%.

c. H = Number of tracks required to store the entire file.

G = Number of records per track = (11 blocks / track) * (10 records / block) = 110 records / track

The CEIL operator is the Ceiling operator. It is similar to the INT operator, except that it takes the next higher integer if the argument is not an exact integer.

H = Number of tracks = CEIL[ N / G ] = 1819 tracks

d. J = Total waste to store the entire file = (H - 1) * F = 2,545,200 bytes / file

e. K = Time to write all of the blocks. (Use period of revolution; ignore the time it takes to move to the next track.)

Assume it takes one revolution to record one track.

K = H * T = (1819 tracks) * (10 ms / track) = 18190 ms = 18.19 s

f. M = Time to write all of the records if they are not blocked. (Use period of revolution; ignore the time it takes to move to the next track.)

Assuming we treat the disk like a tape. The total file is 32,000,000 bytes long, which easily can fit in a PC RAM. We can declare a buffer to be the length of the track, and worry about parsing the file back into records when we reread the data.

In this case, we use CEIL(N * L / R) = 1685 tracks. This is 4 surfaces.

M = (N * L / R) * T = 16.842 s

g. P = Optimal blocking factor to minimize waste = INT(R / L) = 118 records / block

The wastage is Q = R - P * L = 120 bytes / track

h. What would be the answer to (e) if the time it takes to move to the next track were 5 ms?

Since we used 1819 tracks, we used tracks on 4 surfaces. When we change surfaces, we do not need to move the arm to another track. Assume also that we do not need to move the arm to position it to the first record in the file.

U = K + (1819 - 4)* 5 ms = 18190 ms + 9075 ms = 27265 ms = 27.265 s

i. What would be the answer to (f) if the time it takes to move to the next track were 5 ms?

In this

V = M + [CEIL(N * L / R) - 4] * 5 ms = 16842 ms + [1685 - 4] * 5 ms = 16842 + 8504 = 25247 ms = 25.247 s

7 0
3 years ago
Other questions:
  • All languages from the second generation on must be translated into machine language for the computer to be able process the inp
    8·1 answer
  • In this program, you will create an object and display it. Create a class nerf Gun that includes data members model (string), ra
    5·1 answer
  • An airline company would like to easily locate lost luggage. What technology would make it easier for them to locate the luggage
    6·2 answers
  • One of the ways attackers can access unencrypted data being transmitted on your network is by
    10·1 answer
  • Write the definitions for three function named max. Each receives two parameters, of the same type, and returns the larger of th
    12·1 answer
  • Basic rule for java languague
    13·2 answers
  • Does two core processors mean that it is twice as fast do you agree? why?
    13·1 answer
  • Match each type of software license with the appropriate definition.
    11·1 answer
  • Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error
    14·1 answer
  • Silas develops this algorithm to compute the calories burned for an activity for a given number of minutes and body weight: If t
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!