1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gelneren [198K]
2 years ago
9

Be your self today!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Computers and Technology
1 answer:
Georgia [21]2 years ago
5 0

Answer:

So, Do my work quickly get an A+ and play ro blox for the rest of the day?

You might be interested in
________ work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
RSB [31]
Cell phones work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
4 0
3 years ago
Your company decided to upgrade the older office Ethernet network and needs the fastest speed possible but has decided against f
solmaris [256]

Answer:

10G Ethernet

Explanation:

These are the options for the question;

A) 10BASE Ethernet

B) Gigabit Ethernet

C) Fast Ethernet

D) 10G Ethernet

From the question, we are informed about instance of my company deciding to upgrade the older office Ethernet network and needs the fastest speed possible but has decided against fiber optic cable. In this case my solution for this problem is getting

10G Ethernet. Ethernet can be regarded as traditional technology that connects devices in LAN(wired local area network) as well as WAN(wide area network) which allows them to have communication with each other through a protocol, this protocol is reffered to as common network language, it also be regarded as rules. 10 Gigabit Ethernet which is a technology ofgroup of computer networking that enables transmission of Ethernet frames at high rate of 10 gigabits per second. Therefore, 10G Ethernet is the solution since we need

the fastest possible speed.

5 0
3 years ago
Create a function (prob3_6) that will do the following: Input a positive scalar integer x. If x is odd, multiply it by 3 and add
aniked [119]

Answer:

Following are the program in python language

def prob3_6(k): #function definition

  c = 0 #variable declaration

  while k != 1: #iterating the while loop

      print(k) #print k

      if k % 2 == 0:#check if condition  

          k= k // 2 #divisible by 2

      else: #else condition

          k = k * 3 + 1  

      c = c + 1

  print(k) #print k

  print c #print count

prob3_6(3)#function call

Output:

3

10

5

16

8

4

2

1

7

Explanation:

Following are the description of program

  • Create a function "prob3_6" in this function we passing an integer parameter of type "int" named "k".
  • Inside that function we declared a variable "c" of type "int" that is used for counting purpose .
  • After that we iterated the while for print the value of when it is not equal to 1 .
  • We check if condition when k gives 0 on modulus then k is divisible by 2 otherwise else block will be executed in the else part we multiply by 3 to k and add 1 to the k variable .
  • Finally print "k" and "c"

5 0
3 years ago
You want to copy data from one cell or range to an adjacent cell or range in your spreadsheet, without using a shortcut key. Whi
astraxan [27]

How can you insert a new row into your data without disturbing an adjacent set of data on the same sheet? Highlight only the data where you'd like to insert a row. Right-click > Insert > Shift cells down.

3 0
2 years ago
A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a
klasskru [66]

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

3 0
3 years ago
Other questions:
  • Is there truth? Does truth exists?
    14·2 answers
  • Besides the Computer Inventory and Maintenance form, what other documentation should you keep on each computer? How might you st
    8·1 answer
  • What X coordinate does the center of a game begin at?
    9·1 answer
  • __________ are hosted on dedicated computers known as 'web servers'.​
    8·2 answers
  • Need help please. this effect my technology
    15·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • Instructions
    13·1 answer
  • Classify the following as cross-section or time-series data: Gross sales of 200 ice cream parlors in July 2009
    8·1 answer
  • Question 3 of 10<br> What was the fly in the ointment of Timmy's friendship with Rollo?
    10·1 answer
  • Disadvantages of a grain crusher
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!