1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
3 years ago
13

What do you like to play

Computers and Technology
2 answers:
Ad libitum [116K]3 years ago
3 0

Answer:I like to play sports

Explanation:

Xelga [282]3 years ago
3 0

My Answer Is... Pokemon!!

You might be interested in
A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and
Musya8 [376]

Answer: (B) Lossless compression

Explanation:

 According to the question, the given technique is the example of the lossless compression. The lossless compression is one of the technique that decompress the data into the original data form without any type of losses.

The lossless compression is the technique that usually compress the data, text and the databases. This technique also improve the compression rate helps in reconstruct the original data. It is used in various types of encoding methods, GNU tool and zip file.

3 0
4 years ago
The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.A. True
Zarrin [17]

Answer:

B. False

Explanation:

Sarbanes-Oxley Act or SOX also known as the Public Company Accounting Reform and Investor Protection Act and Corporate and Auditing Accountability, Responsibility, and Transparency Act is a United State federal law that creates or modify requirements for U.S public company board, management and public accounting firm. some of its policies are meant for private companies as well.

This act does not restrict any electronic and paper data containing personally identifiable financial information.

6 0
4 years ago
द्विआधार जोड गर (Binary<br>addition):<br>-<br>(i) 1012 + 1112<br>(ii) 1112 + 100​
fenix001 [56]

Answer:

1.2124

2.1212 is the correct answer right

4 0
3 years ago
. Assuming each reference costs 1 byte, and each piece of data/info costs 1 byte as well. When will a doubly linked list be more
mixer [17]

Answer:

The circular individually linked list is more efficient for time sharing process ,when multiple application are running on pc it is responsibility of an output system to put all process on a list and execute them all by giving them piece of time and make them wait when cpu is selected to other process.

It will be more suitable for output system to use circular list as when it reaches to last of list it will be manually reaches to starting node or process.

Singly circular linked list is used when we are concerned with the memory as only one process will be allocated memory at once and there are no chances of process to go never-ending waiting.

Explanation:

4 0
3 years ago
In case of rdt 3.0 Stop and Wait, suppose we send a packet of 1KB through 1 Gbps link and RTT=20 msec. Find the sender utilizati
Mamont248 [21]

Answer:

a. Utilization =  0.00039

b. Throughput = 50Kbps

Explanation:

<u>Given Data:</u>

Packet Size = L = 1kb = 8000 bits

Transmission Rate = R = 1 Gbps = 1 x 10⁹ bps

RTT = 20 msec

<u>To Find </u>

a. Sender Utilization = ?

b. Throughput = ?

Solution

a. Sender Utilization

<u>As Given </u>

Packet Size =  L = 8000 bits

Transmission Rate = R = 1 Gbps = 1 x 10⁹ bps

Transmission Time = L/R = 8000 bits / 1 x 10⁹ bps = 8 micro-sec

Utilization =  Transmission Time / RTT + Transmission Time

                 =  8 micro-sec/ 20 msec + 8 micro-sec

                 =  0.008 sec/ 20.008 sec

Utilization =  0.00039

b. Throughput

<u>As Given </u>

Packet Size = 1kb

RTT = 20ms = 20/100 sec = 0.02 sec

So,

Throughput = Packet Size/RTT = 1kb /0.02 = 50 kbps

So, the system has 50 kbps throughput over  1 Gbps Link.

5 0
3 years ago
Other questions:
  • It is safe to use your bright headlights if there is a car ahead of you within 300 feet
    9·2 answers
  • Point mode allows you to select cells for use in a formula by using your finger or the pointer
    7·1 answer
  • What does "FDDI" stand for in Technology?
    5·2 answers
  • What is the accounting equation?
    12·1 answer
  • Describe one example of how technology assits people with data and sample collection
    14·2 answers
  • Suppose there are two links between a source and a destination. The first link has transmission rate 100 Mbps and the second lin
    12·1 answer
  • The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
    15·1 answer
  • What are the vertical areas of the spreadsheet?
    14·1 answer
  • Explain the concept of conditional formatting​
    9·1 answer
  • What is the computer?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!