1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delicious77 [7]
3 years ago
10

That’s the photo you where asking for

Computers and Technology
2 answers:
jek_recluse [69]3 years ago
4 0
I think the answer is C
REY [17]3 years ago
3 0
I think it is frest one
You might be interested in
Which of the following statements is true for DMA: (only one correct answer) A. In DMA, Processor checks status until the operat
Ronch [10]

Answer:

<u>D. In DMA, interrupt is sent when the task is completed</u>

Explanation:

Note, the term Direct Memory Access simply refers to a computer feature that allows hardware subsystems to directly access the main system memory of a computer, without any the aid of the central processing unit (CPU).

It is a fact that while the transfer process is ongoing, an interrupt (interrupt signal) is not sent until when the task is completed.

6 0
3 years ago
Online platforms that allow users to represent themselves via a profile on a web site and provide and receive links to other net
Ksju [112]

Main Answer:<u> A Social networking service is an online platform that allow users to represent themselves via a profile and web site and provide and receive links to other network members </u>

Sub heding:

What is social networking service?

Explanation:

1.A social networking services is an online platform that allow users to represent themselves via a profile and web site and provide and receive links to other networks members

2.social networking services vary in format and the numbers of features

Reference link:

https//brainly.com

Hashtag:

#SPJ4

4 0
2 years ago
What are the pros and cons of using the internet in a medical office setting?
konstantin123 [22]
Pros:
-They can share information between different medical offices quicker than they could before hand.
-It is cheaper to send information via the internet than it is to hand it by hand

Cons:
-Hackers can get access to the medical patient's information.
-The upkeep costsof the internet connection may lower their income.
7 0
3 years ago
Write a C++ program that produces a simple personalized adventure game called Lost Fortune about a band of explorers that finds
Natasha2012 [34]

Answer:

Detailed answer is given :

8 0
3 years ago
Why would you convert your birth year to binary numbers?
I am Lyosha [343]

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!

6 0
3 years ago
Other questions:
  • Technician A says that the last step in the diagnostic process is to verify the problem. Technician B says that the second step
    12·1 answer
  • Sam has sent Sally an email. Sally wants to answer him without manually typing in his email address. Which email option should s
    12·2 answers
  • Which line in the following program contains the header for the showDub function? 1 #include«iostream» 2 using namespace std; 4
    15·1 answer
  • Which of the following could not be represented by columns in the SPSS data editor? a. Levels of between-group variables. b. Lev
    11·2 answers
  • What is another term for accountability?
    7·2 answers
  • Which of the following represents the biggest difference between asymmetric and symmetric cryptography?
    9·1 answer
  • Which of the following Web sites would be MOST credible?
    6·1 answer
  • A carver begins work on the following block of granite that weighs 2700 g. What is the density of the granite?
    13·1 answer
  • Who plays xbox one offline and knows some multiplayer games that can be played offline.
    15·2 answers
  • Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!