1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
3 years ago
15

In what domain electrica energy is the most use

Computers and Technology
1 answer:
amm18123 years ago
5 0

Answer:the main signal bearing entities are voltage and their current in circuit environments.

Explanation:

You might be interested in
Which of the following statements is false? Data is lost when a local variable "goes out of scope." Data maintained in files is
Veronika [31]

Answer:

The false statement is "Data maintained in files is often called transient data".

Explanation:

In computer programming, transient data is a temporary storage to hold the value which is created within an application session. The transient data will be discarded at the end of the program. The transient data will be reset to its default value when running the program again.  In contrast, file is known as a persistent storage which will still hold data even after end of a program. This is the reason the statement "Data maintained in files is often called transient data" is contradictory and therefore is considered a false statement.

5 0
3 years ago
Provide examples of the cost of quality based on your own experiences
Phoenix [80]

Answer:

Cost of quality is define as methodology which basically decide the cost of product and services in an organisation and company. It also determine all the cost which are associated with the quality.

The cost of quality basically divided into four categories that are:

  • Appraisal
  • Prevention
  • External failure
  • Internal failure

Example of the cost of quality is that, in oil refinery industry if the growth of product increased then, the company state also increased. In same way, if there is decrease in the refining state of the product then, the growth of product automatically reduced.

3 0
3 years ago
I’m buying a prebuilt pc once I get it and set it up, what do I need to install on it?
jarptica [38.1K]
First thing you want to install are the drivers for your GPU and CPU if they aren’t automatically installed. Just search the specific GPU or CPU and download them from the company websites. You can see your CPU and GPU by opening System Configuration or System. You also want to install the latest Windows defender updates as well as Windows updates. Once you have these completed, you should be all set. If anyone wants to add anything specific, feel free to comment below.
7 0
3 years ago
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
2 years ago
ITS: Explain briefly<br>Character​
amid [387]

Answer:

what is briefly tell me also

7 0
3 years ago
Other questions:
  • How can you tell which of the policies in the security options folder have changed settings?
    10·1 answer
  • There are 10 red apples and 12 green apples in a basket. If Vinta randomly selects 3 apples from the basket, what is the probabi
    15·1 answer
  • In which of these scenarios would the top 10 option be most helpful
    10·1 answer
  • What is instant messaging
    5·1 answer
  • What is information technology?
    12·1 answer
  • The permissions of a file in a Linux system are split into three sets of three permissions: read, write, and execute for the own
    13·1 answer
  • E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.a) trueb) fa
    8·1 answer
  • How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i &lt; months) { futureValue = fu
    12·1 answer
  • When changing lanes on an expressway signal your intentions and?
    8·1 answer
  • (Giving brainliest to best answer, don't make an answer if you don't know or its jumble)
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!