1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexeev081 [22]
2 years ago
15

........................ allows you to press a key or code for insertion of long phrases that you may require using repeatedly w

hich saves time. *
Computers and Technology
2 answers:
ollegr [7]2 years ago
5 0

Answer:

text expander

Explanation:

Anettt [7]2 years ago
4 0

Answer:

The answer to this is a text expander!

Hope this helps you! Have a nice day!

You might be interested in
Which of the following correctly describes the reason for quality customer service?
Alexandra [31]

The correct answer is C. Keep existing customers and clients

Explanation:

Customer service refers to the interaction with customers and support employees in a company provide to customer to guarantee he or she has the best experience when buying one product or service. A high-quality customer service implies providing complete information to customers, and helping them before, during, and even after their process in buying or looking for information in a company. The main purpose of this is that customers feel the support from employees, and are loyal to the company which means they will go back if they need the same service or products. Thus, the reason for quality customer service is "Keep existing customers and clients".

3 0
3 years ago
Read 2 more answers
To apply the rule of thirds you first? PLZ HURRY AND ANSWER THIS
Deffense [45]
B/ Divide the viewpoint into three equal vertical divisions
5 0
3 years ago
Read 2 more answers
4. In this problem, we consider sending real-time voice from Host A to Host B over a packet-switchednetwork (VoIP). Host A conve
mina [271]

Answer:

The time elapsed is 0.017224 s

Solution:

As per the question:

Analog signal to digital bit stream conversion by Host A =64 kbps

Byte packets obtained by Host A = 56 bytes

Rate of transmission = 2 Mbps

Propagation delay = 10 ms = 0.01 s

Now,

Considering the packets' first bit, as its transmission is only after the generation of all the bits in the packet.

Time taken to generate and convert all the bits into digital signal is given by;

t = \frac{Total\ No.\ of\ packets}{A/D\ bit\ stream\ conversion}

t = \frac{56\times 8}{64\times 10^{3}}          (Since, 1 byte = 8 bits)

t = 7 ms = 0.007 s

Time Required for transmission of the packet, t':

t' = \frac{Total\ No.\ of\ packets}{Transmission\ rate}

t' = \frac{56\times 8}{2\times 10^{6}} = 2.24\times 10^{- 4} s

Now, the time elapse between the bit creation and its decoding is given by:

t + t'  + propagation delay= 0.007 + 2.24\times 10^{- 4} s + 0.01= 0.017224 s

8 0
2 years ago
I want to build a video player on the html5 canvas here is my code
jok3333 [9.3K]

Answer:

hospital yestrday after noon ggpupg ki tyutrdcbhsjdvshsjjshsgsgdhsusfsuwwiiwhszia

8 0
1 year ago
For the block of 400 addresses, what is the length of the net id? njit
rewona [7]
23 bits would leave room for 512 node numbers.
3 0
3 years ago
Other questions:
  • In Linux Operating System, what file extension is used forexecutable files?
    6·1 answer
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • #include <iostream>
    9·1 answer
  • Which of the following takes place during the research phase
    7·1 answer
  • bro this scared me, i thought i just got hacked, could someone explain why when i went to ask a question, it kicked me out my ac
    9·2 answers
  • In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours
    8·1 answer
  • Help plz,l didn’t pay attention in class
    7·1 answer
  • HELP ME PLEASE ASAP
    6·1 answer
  • When you check your hard drive to see how much space is available, you are checking your
    15·1 answer
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!